Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/wise/ChenHYL15
%A Chen, Lingwei
%A Hardy, William
%A Ye, Yanfang
%A Li, Tao
%B WISE (1)
%D 2015
%E Wang, Jianyong
%E Cellary, Wojciech
%E Wang, Dingding
%E Wang, Hua
%E Chen, Shu-Ching
%E Li, Tao
%E Zhang, Yanchun
%I Springer
%K dblp
%P 415-430
%T Analyzing File-to-File Relation Network in Malware Detection.
%U http://dblp.uni-trier.de/db/conf/wise/wise2015-1.html#ChenHYL15
%V 9418
%@ 978-3-319-26189-8
@inproceedings{conf/wise/ChenHYL15,
added-at = {2022-10-18T00:00:00.000+0200},
author = {Chen, Lingwei and Hardy, William and Ye, Yanfang and Li, Tao},
biburl = {https://www.bibsonomy.org/bibtex/2c808423c07e16ec8ba903e3bb6675b6c/dblp},
booktitle = {WISE (1)},
crossref = {conf/wise/2015-1},
editor = {Wang, Jianyong and Cellary, Wojciech and Wang, Dingding and Wang, Hua and Chen, Shu-Ching and Li, Tao and Zhang, Yanchun},
ee = {https://doi.org/10.1007/978-3-319-26190-4_28},
interhash = {25135467fef47ac3c618d010c46df2db},
intrahash = {c808423c07e16ec8ba903e3bb6675b6c},
isbn = {978-3-319-26189-8},
keywords = {dblp},
pages = {415-430},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T09:58:46.000+0200},
title = {Analyzing File-to-File Relation Network in Malware Detection.},
url = {http://dblp.uni-trier.de/db/conf/wise/wise2015-1.html#ChenHYL15},
volume = 9418,
year = 2015
}