完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, Ying-Daren_US
dc.contributor.authorLee, Chia-Yinen_US
dc.contributor.authorWu, Yu-Sungen_US
dc.contributor.authorHo, Pei-Hsiuen_US
dc.contributor.authorWang, Fu-Yuen_US
dc.contributor.authorTsai, Yi-Langen_US
dc.date.accessioned2014-12-08T15:35:52Z-
dc.date.available2014-12-08T15:35:52Z-
dc.date.issued2014-04-01en_US
dc.identifier.issn0018-9162en_US
dc.identifier.urihttp://hdl.handle.net/11536/24248-
dc.description.abstractAn exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.en_US
dc.language.isoen_USen_US
dc.titleActive versus Passive Malware Collectionen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERen_US
dc.citation.volume47en_US
dc.citation.issue4en_US
dc.citation.spage59en_US
dc.citation.epage65en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.department網路測試中心zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.contributor.departmentNetwork Benchmarking Laben_US
dc.identifier.wosnumberWOS:000335394400018-
dc.citation.woscount0-
顯示於類別:期刊論文


文件中的檔案:

  1. 000335394400018.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。