Art
J-GLOBAL ID:200902266443918177   Reference number:09A0458769

Automated Malware Analysis System and Its Sandbox for Revealing Malware’s Internal and External Activities

マルウェアの内部および外部活動を明らかにするための自動マルウェア解析システムとそれのサンドボックス
Author (5):
Material:
Volume: E92-D  Issue:Page: 945-954  Publication year: May. 01, 2009 
JST Material Number: L1371A  ISSN: 0916-8532  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Computer networks  ,  Data protection 
Reference (24):
  • BAILEY, M. The Internet motion sensor : A distributed blackhole monitoring system. 12th Annual Network and Distributed System Security Symposium (NDSS05). 2005
  • MOORE, D. Network telescopes : Tracking denial-of-service attacks and Internet worms around the globe. 17th Large Installation Systems Administration Conference (LISA'03). 2003
  • SANS Internet Storm Center. http://isc.sans.org/
  • POUGET, F. Leurre. com : On the advantages of deploying a large scale distributed honeypot platform. E-Crime and Computer Conference (ECCE'05). 2005
  • REN-ISAC : Research and Education Networking Information Sharing and Analysis Center. http://www.ren-isac.net/
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page