Full metadata record
DC FieldValueLanguage
dc.contributor.authorCho, Michael Cheng Yien_US
dc.contributor.authorHsu, Chia-Weien_US
dc.contributor.authorShieh, Shiuhpyngen_US
dc.contributor.authorWang, Chi-Weien_US
dc.date.accessioned2015-07-21T11:21:02Z-
dc.date.available2015-07-21T11:21:02Z-
dc.date.issued2014-11-01en_US
dc.identifier.issn1520-9202en_US
dc.identifier.urihttp://dx.doi.org/10.1109/MITP.2014.86en_US
dc.identifier.urihttp://hdl.handle.net/11536/123931-
dc.description.abstracten_US
dc.language.isoen_USen_US
dc.subjectclouden_US
dc.subjectmalwareen_US
dc.subjectcomputer securityen_US
dc.subjectcloud computingen_US
dc.subjectsecurityen_US
dc.titleCan Malware Be Exterminated by Better Understanding Its Roots?en_US
dc.typeArticleen_US
dc.identifier.doi10.1109/MITP.2014.86en_US
dc.identifier.journalIT PROFESSIONALen_US
dc.citation.volume16en_US
dc.citation.spage47en_US
dc.citation.epage53en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000345580800009en_US
dc.citation.woscount0en_US
Appears in Collections:Articles


Files in This Item:

  1. 000345580800009.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.