Back to Results
First PageMeta Content
Computer worms / Cyberwarfare / Cybercrime / Computer security


EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and
Add to Reading List

Document Date: 2014-10-02 04:23:39


Open Document

File Size: 12,15 KB

Share Result on Facebook