完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.contributor.author | Lee, Chia-Yin | en_US |
dc.contributor.author | Wu, Yu-Sung | en_US |
dc.contributor.author | Ho, Pei-Hsiu | en_US |
dc.contributor.author | Wang, Fu-Yu | en_US |
dc.contributor.author | Tsai, Yi-Lang | en_US |
dc.date.accessioned | 2014-12-08T15:35:52Z | - |
dc.date.available | 2014-12-08T15:35:52Z | - |
dc.date.issued | 2014-04-01 | en_US |
dc.identifier.issn | 0018-9162 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/24248 | - |
dc.description.abstract | An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Active versus Passive Malware Collection | en_US |
dc.type | Article | en_US |
dc.identifier.journal | COMPUTER | en_US |
dc.citation.volume | 47 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 59 | en_US |
dc.citation.epage | 65 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | 網路測試中心 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.contributor.department | Network Benchmarking Lab | en_US |
dc.identifier.wosnumber | WOS:000335394400018 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |