Безопасность информационных технологий (Sep 2011)

Searching Malware and Sources of Its Distribution in the Internet

  • L. L. Protsenko

Journal volume & issue
Vol. 18, no. 3
pp. 134 – 139

Abstract

Read online

In the article is considered for the first time developed by the author algorithm of searching malware and sources of its distribution, based on published HijackThis logs in the Internet.

Keywords