Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Christodorescu, Mihai (Editor), Jha, Somesh (Editor), Maughan, Douglas (Editor), Song, Dawn (Editor), Wang, Cliff (Editor) |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA :
Springer US,
2007.
|
Series: | Advances in Information Security,
27 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Malware Detection
by: Christodorescu, Mihai
Published: (2007) -
Guide to Wireless Network Security
by: Vacca, John R.
Published: (2006) -
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /
Published: (2010) -
CryptoGraphics Exploiting Graphics Cards for Security /
by: Cook, Debra L., et al.
Published: (2006) -
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings /
Published: (2011)