DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, B | - |
dc.contributor.author | Chan-Tin, E | - |
dc.contributor.author | Lee, C | - |
dc.contributor.author | Tyra, J | - |
dc.contributor.author | Kang, H | - |
dc.contributor.author | Nunnery, C | - |
dc.contributor.author | Wadler, Z | - |
dc.contributor.author | Sinclair, G | - |
dc.contributor.author | Hopper, N | - |
dc.contributor.author | Dagon, D | - |
dc.contributor.author | Kim, Yongdae | - |
dc.date.accessioned | 2013-03-28T07:14:17Z | - |
dc.date.available | 2013-03-28T07:14:17Z | - |
dc.date.issued | 2009-03 | - |
dc.identifier.citation | ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , v., no., pp. - | - |
dc.identifier.uri | http://hdl.handle.net/10203/163772 | - |
dc.language | ENG | - |
dc.publisher | ACM | - |
dc.title | Towards Complete Node Enumeration in a Peer-to-Peer Botnet | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) | - |
dc.identifier.conferencecountry | Australia | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Kang, B | - |
dc.contributor.nonIdAuthor | Chan-Tin, E | - |
dc.contributor.nonIdAuthor | Lee, C | - |
dc.contributor.nonIdAuthor | Tyra, J | - |
dc.contributor.nonIdAuthor | Kang, H | - |
dc.contributor.nonIdAuthor | Nunnery, C | - |
dc.contributor.nonIdAuthor | Wadler, Z | - |
dc.contributor.nonIdAuthor | Sinclair, G | - |
dc.contributor.nonIdAuthor | Hopper, N | - |
dc.contributor.nonIdAuthor | Dagon, D | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.