Temporal behavior analysis of malware/bot downloads using top-10 processing
| dc.contributor.author | Chaxiong Yukonhiatou | |
| dc.contributor.author | Surin Kittitornkun | |
| dc.contributor.author | Hiroaki Kikuchi | |
| dc.contributor.author | Khamphao Sisaat | |
| dc.contributor.author | Masato Terada | |
| dc.contributor.author | Hiroshi Ishii | |
| dc.date.accessioned | 2025-07-21T05:54:11Z | |
| dc.date.issued | 2013-09-01 | |
| dc.identifier.doi | 10.1109/icsec.2013.6694806 | |
| dc.identifier.uri | https://dspace.kmitl.ac.th/handle/123456789/4185 | |
| dc.subject | Botnet | |
| dc.subject | Download | |
| dc.subject | Honeypot | |
| dc.subject | Malware analysis | |
| dc.subject.classification | Network Security and Intrusion Detection | |
| dc.title | Temporal behavior analysis of malware/bot downloads using top-10 processing | |
| dc.type | Article |