2017 2nd IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2017
DOI: 10.1109/rteict.2017.8256552
|View full text |Cite
|
Sign up to set email alerts
|

Ways for protection against various attacks in the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…It was an outstanding accomplishment that the malicious code could be seen as a grey gif. This approach has been used by other researchers to identify and extract malware [11,20] It was a tremendous accomplishment to be able to imagine the malicious code as a grey graphic. Many researchers have used this technique to identify and track malware.…”
Section: Related Workmentioning
confidence: 99%
“…It was an outstanding accomplishment that the malicious code could be seen as a grey gif. This approach has been used by other researchers to identify and extract malware [11,20] It was a tremendous accomplishment to be able to imagine the malicious code as a grey graphic. Many researchers have used this technique to identify and track malware.…”
Section: Related Workmentioning
confidence: 99%