Vol-2622⫷ Vol-2623 ⫸Vol-2624
urn:nbn:de:0074-2623-0


Vol-2623/paper17⫷Vol-2623/paper18⫸Vol-2623/paper19

Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks