Amanote Research

Amanote Research

    RegisterSign In

Quantifying Malware Evolution Through Archaeology

Journal of Information Security
doi 10.4236/jis.2015.62011
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2015

Authors
Jeremy D. SeidemanBilal KhanCesar Vargas
Publisher

Scientific Research Publishing, Inc,


Related search

Rethinking Colonial Pasts Through Archaeology

2014English

Effective Teaching-Learning Transaction Through Archaeology

2019English

12 Pathways Through the Archaeology of Neighborhoods

Archeological Papers of the American Anthropological Association
Archeology
2019English

Malware Detection Through Mining Symbol Table of Linux Executables

Information Technology Journal
2013English

Bridging Theory and Bow Hunting: Human Cognitive Evolution and Archaeology

Antiquity
ArcheologyArtsHumanities
2016English

Malware Detection Using Honeypot and Malware Prevention

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY
2019English

Enhancing Knowledge Through Archaeology and Epigraphy: Research and Development

Heritage of Nusantara: International Journal of Religious Literature and Heritage
2017English

Quantifying Uncertainty Through Global and Mesoscale Ensembles

2009English

Exhibiting Archaeology: Archaeology and Museums

Annual Review of Anthropology
AnthropologyArtsCultural StudiesHumanities
2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy