<--- Back to Details
First PageDocument Content
Computer worms / Cyberwarfare / Cybercrime / Computer security
Date: 2014-10-02 04:23:39
Computer worms
Cyberwarfare
Cybercrime
Computer security

EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 12,15 KB