Malware Detection

Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Christodorescu, Mihai. (Editor, http://id.loc.gov/vocabulary/relators/edt), Jha, Somesh. (Editor, http://id.loc.gov/vocabulary/relators/edt), Maughan, Douglas. (Editor, http://id.loc.gov/vocabulary/relators/edt), Song, Dawn. (Editor, http://id.loc.gov/vocabulary/relators/edt), Wang, Cliff. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Advances in Information Security, 27
Subjects:
Online Access:https://doi.org/10.1007/978-0-387-44599-1