2019 International Conference on ICT for Smart Society (ICISS) 2019
DOI: 10.1109/iciss48059.2019.8969789
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Malware has various types, namely viruses, worms, spyware, adware, trojans, keyloggers, rootkits, botnets and phishing [1]. Malware can be spread using various attack vector, including website and USB Flash Drive [2]. One example of malware is botnet, botnet is usually used to send spam and phishing host websites that make it difficult to track and blacklist [3].…”
Section: Introductionmentioning
confidence: 99%
“…Malware has various types, namely viruses, worms, spyware, adware, trojans, keyloggers, rootkits, botnets and phishing [1]. Malware can be spread using various attack vector, including website and USB Flash Drive [2]. One example of malware is botnet, botnet is usually used to send spam and phishing host websites that make it difficult to track and blacklist [3].…”
Section: Introductionmentioning
confidence: 99%