Temporal behaviors of Top-10 malware download in 2010–2012
| dc.contributor.author | Chaxiong Yukonhiatou | |
| dc.contributor.author | Surin Kittitornkun | |
| dc.contributor.author | Hiroaki Kikuchi | |
| dc.contributor.author | Khamphao Sisaat | |
| dc.contributor.author | Masato Terada | |
| dc.contributor.author | Hiroshi Ishii | |
| dc.date.accessioned | 2025-07-21T05:54:42Z | |
| dc.date.issued | 2014-03-01 | |
| dc.identifier.doi | 10.1109/ieecon.2014.6925944 | |
| dc.identifier.uri | https://dspace.kmitl.ac.th/handle/123456789/4482 | |
| dc.subject | Download | |
| dc.subject | Botnet | |
| dc.subject | Honeypot | |
| dc.subject | Malware analysis | |
| dc.subject.classification | Network Security and Intrusion Detection | |
| dc.title | Temporal behaviors of Top-10 malware download in 2010–2012 | |
| dc.type | Article |