Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/intelitsis/NicheporukPSSG20
%A Nicheporuk, Andrii
%A Paiuk, Vadym
%A Savenko, Bohdan
%A Savenko, Oleg
%A Geidarova, Olena
%B IntelITSIS
%D 2020
%E Hovorushchenko, Tetiana
%E Savenko, Oleg
%E Popov, Peter T.
%E Lysenko, Sergii
%I CEUR-WS.org
%K dblp
%P 194-207
%T Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks.
%U http://dblp.uni-trier.de/db/conf/intelitsis/intelitsis2020.html#NicheporukPSSG20
%V 2623
@inproceedings{conf/intelitsis/NicheporukPSSG20,
added-at = {2023-03-10T00:00:00.000+0100},
author = {Nicheporuk, Andrii and Paiuk, Vadym and Savenko, Bohdan and Savenko, Oleg and Geidarova, Olena},
biburl = {https://www.bibsonomy.org/bibtex/29caca248a148e07af71cf8b803435b0f/dblp},
booktitle = {IntelITSIS},
crossref = {conf/intelitsis/2020},
editor = {Hovorushchenko, Tetiana and Savenko, Oleg and Popov, Peter T. and Lysenko, Sergii},
ee = {https://ceur-ws.org/Vol-2623/paper18.pdf},
interhash = {2b34b958ad9fe1a06a17db134f4b3eec},
intrahash = {9caca248a148e07af71cf8b803435b0f},
keywords = {dblp},
pages = {194-207},
publisher = {CEUR-WS.org},
series = {CEUR Workshop Proceedings},
timestamp = {2024-04-09T19:20:48.000+0200},
title = {Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks.},
url = {http://dblp.uni-trier.de/db/conf/intelitsis/intelitsis2020.html#NicheporukPSSG20},
volume = 2623,
year = 2020
}