The Research of Key Management Policies for Malicious Code Defense
碩士 === 中華大學 === 資訊管理學系(所) === 97 ===
Main Authors: | Wei-Chih Tai, 戴維志 |
---|---|
Other Authors: | Mei-Yu Wu |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75975418847253921174 |
Similar Items
-
A Study of Dynamic Propagation and Defense Policy for Malicious Software
by: Pei-Chen Sung, et al.
Published: (2013) -
Automated Analyses of Malicious Code
by: Krister, Kris Mikael
Published: (2009) -
Robust transmission algorithm in network coding domain with the presence of malicious nodes
by: FanChiang, Chun-Chih, et al.
Published: (2011) -
Research on Malicious Code Family Classification Combining Attention Mechanism
by: WANG Runzheng, GAO Jian, TONG Xin, YANG Mengqi
Published: (2021-05-01) -
A Study of Malicious Code Detection
by: Dy Wu, et al.
Published: (2013)