Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Saved in:
Main Author: | Christodorescu, Mihai |
---|---|
Corporate Author: | SpringerLink (Online service) |
Other Authors: | Jha, Somesh, Maughan, Douglas, Song, Dawn, Wang, Cliff |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA :
Springer US,
2007.
|
Series: | Advances in information security ;
27. |
Subjects: | |
Online Access: | Full text (Wentworth users only). |
Similar Items
-
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
by: Poovendran, Radha
Published: (2007) -
CryptoGraphics Exploiting Graphics Cards for Security
by: Cook, Debra L.
Published: (2006) -
Security for Wireless Sensor Networks
by: Liu, Donggang
Published: (2007) -
Guide to Wireless Network Security
by: Vacca, John R.
Published: (2006) -
Digital Signatures
by: Katz, Jonathan
Published: (2010)