Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

How to detect unknown malicious code efficiently

Full metadata record
DC Field Value Language
dc.contributor.authorUNKNOWN-
dc.date.accessioned2021-08-28T19:29:23Z-
dc.date.available2021-08-28T19:29:23Z-
dc.date.created2021-04-22-
dc.date.issued2015-12-05-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/30934-
dc.publisherIEEE-
dc.titleHow to detect unknown malicious code efficiently-
dc.title.alternativeHow to detect unknown malicious code efficiently-
dc.typeConference-
dc.contributor.affiliatedAuthorUNKNOWN-
dc.identifier.bibliographicCitationIEEE International Conference of Computing, Communication and Security-
dc.relation.isPartOfIEEE International Conference of Computing, Communication and Security-
dc.relation.isPartOfIEEE International Conference of Computing, Communication and Security-
dc.citation.titleIEEE International Conference of Computing, Communication and Security-
dc.citation.conferencePlaceMU-
dc.citation.conferenceDate2015-12-04-
dc.type.rimsCONF-
dc.description.journalClass1-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE