Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Ying-Daren_US
dc.contributor.authorLee, Chia-Yinen_US
dc.contributor.authorWu, Yu-Sungen_US
dc.contributor.authorHo, Pei-Hsiuen_US
dc.contributor.authorWang, Fu-Yuen_US
dc.contributor.authorTsai, Yi-Langen_US
dc.date.accessioned2014-12-08T15:35:52Z-
dc.date.available2014-12-08T15:35:52Z-
dc.date.issued2014-04-01en_US
dc.identifier.issn0018-9162en_US
dc.identifier.urihttp://hdl.handle.net/11536/24248-
dc.description.abstractAn exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.en_US
dc.language.isoen_USen_US
dc.titleActive versus Passive Malware Collectionen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERen_US
dc.citation.volume47en_US
dc.citation.issue4en_US
dc.citation.spage59en_US
dc.citation.epage65en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.department網路測試中心zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.contributor.departmentNetwork Benchmarking Laben_US
dc.identifier.wosnumberWOS:000335394400018-
dc.citation.woscount0-
Appears in Collections:Articles


Files in This Item:

  1. 000335394400018.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.