Detection of Intrusions and Malware, and Vulnerability Assessment
Springer-Verlag Berlin Heidelberg
Chapter title |
BISSAM: Automatic Vulnerability Identification of Office Documents
|
---|---|
Chapter number | 12 |
Book title |
Detection of Intrusions and Malware, and Vulnerability Assessment
|
Published in |
Lecture notes in computer science, July 2012
|
DOI | 10.1007/978-3-642-37300-8_12 |
Book ISBNs |
978-3-64-237299-5, 978-3-64-237300-8
|
Authors |
Thomas Schreck, Stefan Berger, Jan Göbel |
Country | Count | As % |
---|---|---|
India | 1 | 7% |
Unknown | 13 | 93% |
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 4 | 29% |
Student > Bachelor | 2 | 14% |
Researcher | 2 | 14% |
Student > Master | 2 | 14% |
Other | 1 | 7% |
Other | 0 | 0% |
Unknown | 3 | 21% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 9 | 64% |
Engineering | 1 | 7% |
Unknown | 4 | 29% |