Malicious Software Detection System in a Virtual Machine Using Database.
H. woo Cheon, K. won Lee, S. Lee, und G. Lee. ICHIT (2), Volume 206 von Communications in Computer and Information Science, Seite 212-218. Springer, (2011)
Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/ichit/CheonLLL11
%A woo Cheon, Hyun
%A won Lee, Kyu
%A Lee, Sang-Ho
%A Lee, Geuk
%B ICHIT (2)
%D 2011
%E Lee, Geuk
%E Howard, Daniel
%E Slezak, Dominik
%I Springer
%K dblp
%P 212-218
%T Malicious Software Detection System in a Virtual Machine Using Database.
%U http://dblp.uni-trier.de/db/conf/ichit/ichit2011-2.html#CheonLLL11
%V 206
%@ 978-3-642-24105-5
@inproceedings{conf/ichit/CheonLLL11,
added-at = {2017-05-17T00:00:00.000+0200},
author = {woo Cheon, Hyun and won Lee, Kyu and Lee, Sang-Ho and Lee, Geuk},
biburl = {https://www.bibsonomy.org/bibtex/2ebd8c1180ed1910561bbe6b497c3c268/dblp},
booktitle = {ICHIT (2)},
crossref = {conf/ichit/2011-2},
editor = {Lee, Geuk and Howard, Daniel and Slezak, Dominik},
ee = {https://doi.org/10.1007/978-3-642-24106-2_28},
interhash = {b44562b34e34d8f08c4b9da79c1a84e7},
intrahash = {ebd8c1180ed1910561bbe6b497c3c268},
isbn = {978-3-642-24105-5},
keywords = {dblp},
pages = {212-218},
publisher = {Springer},
series = {Communications in Computer and Information Science},
timestamp = {2017-12-29T12:06:47.000+0100},
title = {Malicious Software Detection System in a Virtual Machine Using Database.},
url = {http://dblp.uni-trier.de/db/conf/ichit/ichit2011-2.html#CheonLLL11},
volume = 206,
year = 2011
}