Vol-3674⫷ Vol-3675 ⫸Vol-3676
urn:nbn:de:0074-3675-0


Vol-3675/paper19⫷Vol-3675/paper20⫸Vol-3675/paper21

Methods for Detecting Software Implants in Corporate Networks