Malware : Malicious Software in IT/OT Systems

作者: Tomasz GIERSZEWSKI

DOI: 10.17274/AEZ.2016.26.09

关键词: BiologyMalwareComputer security

摘要:

参考文章(14)
Blake Hartstein, Matthew Richard, Steven Adair, Michael Ligh, Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code ,(2010)
Wojciech Molisz, Tomasz Gierszewski, Ataki ddos - przegląd zagrożeń i środków zaradczych Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne. pp. 720- 728 ,(2014)
Mangal Sain, Hoon-Jae Lee, Jonathan A.P. Marpaung, Survey on malware evasion techniques: State of the art and challenges international conference on advanced communication technology. pp. 744- 749 ,(2012)
Ramesh Yerraballi, Amit Vasudevan, SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48. pp. 311- 320 ,(2006)
Maryam Nezhadkamali, Seyed Amin Hosseini Seno, Rahmat Budiarto, Somayeh Soltani, A survey on real world botnets and detection mechanisms International Journal of Information and Network Security. ,vol. 3, pp. 116- 127 ,(2014)
Kevin W Hamlen, Vishwath Mohan, Mohammad M Masud, Latifur Khan, Bhavani Thuraisingham, None, Exploiting an antivirus interface Computer Standards & Interfaces. ,vol. 31, pp. 1182- 1189 ,(2009) , 10.1016/J.CSI.2009.04.004
Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro, Survey and taxonomy of botnet research through life-cycle ACM Computing Surveys. ,vol. 45, pp. 45- ,(2013) , 10.1145/2501654.2501659
Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen, Measuring Botnets in the Wild: Some New Trends computer and communications security. pp. 645- 650 ,(2015) , 10.1145/2714576.2714637