Безопасность информационных технологий (Sep 2011)
Searching Malware and Sources of Its Distribution in the Internet
Abstract
In the article is considered for the first time developed by the author algorithm of searching malware and sources of its distribution, based on published HijackThis logs in the Internet.