Building an Attack Scenario Database with Causal Relationship of Worm Attack Behaviors and its Applications
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 95 === In information explosion time, network and computer bring people conveniences when there is more advanced in science and technology. However, there are many kinds of attacks are coming after convenience. More and more attack types are discovered, for example f...
Main Authors: | Chung-Chih Chiang, 姜忠志 |
---|---|
Other Authors: | Chi-Sung Laih |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/30303309770188694656 |
Similar Items
-
Building an Attack Scenario Database with Causal Relationship of Intrusive Behaviors in Windows System and DDoS Attack
by: Chih-Hsiang Liang, et al.
Published: (2008) -
Building an Attack Scenario Database with Causal Relationship of Intrusive Behaviors in Unix-like Systems and its Applications
by: Chien-Hung Chen, et al.
Published: (2007) -
The Attack on the Tooth Worm
by: Wiel van der Mark
Published: (2016-08-01) -
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008) -
On countermeasures of worm attacks over the Internet
by: Yu, Wei
Published: (2010)