Searching Malware and Sources of Its Distribution in the Internet

In the article is considered for the first time developed by the author algorithm of searching malware and sources of its distribution, based on published HijackThis logs in the Internet.

Bibliographic Details
Main Author: L. L. Protsenko
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2011-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/631