A Study of Malicious CryptoCurrency Mining on IOT

碩士 === 國立屏東大學 === 資訊科學系碩士班 === 106 ===   With the ever-changing nature of network technology ,the attacker technique also keep pace with the times, from the most basic intrusion devices to the theft of favorable information, to the recent notorious extortion software or the theft of cash at the ATM,...

Full description

Bibliographic Details
Main Authors: WANG, CHIEN-KAI, 王建凱
Other Authors: YANG, CHENG-HSING
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/waxrut