The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
碩士 === 華梵大學 === 資訊管理學系碩士班 === 102 === Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then t...
Main Authors: | Chnu-Fu Tseng, 曾俊夫 |
---|---|
Other Authors: | Zne-Jung Lee |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10943942770242535196 |
Similar Items
-
Detecting Malicious Code by Binary File Checking
by: Marius POPA
Published: (2014-01-01) -
Suppress Malicious Scripts by File Format Conversion
by: Jian-YuanMa, et al.
Published: (2011) -
Advance system and model to predict malicious files prorogation inside computer network
by: Ashraf Ahmad, et al.
Published: (2019-01-01) -
USER-SPACE, CUSTOM FILE SYSTEM FOR PROXY SERVERS
by: DHAR, MEGHNA
Published: (2003) -
Multiple Level Grouping File System for Web Proxy Server
by: I-Fan Chen, et al.
Published: (2005)