Applied Cryptography and Network Security
Springer International Publishing
Chapter title |
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
|
---|---|
Chapter number | 24 |
Book title |
Applied Cryptography and Network Security
|
Published by |
Springer, Cham, June 2015
|
DOI | 10.1007/978-3-319-28166-7_24 |
Book ISBNs |
978-3-31-928165-0, 978-3-31-928166-7
|
Authors |
Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao |
Country | Count | As % |
---|---|---|
Germany | 1 | 3% |
Korea, Republic of | 1 | 3% |
Slovakia | 1 | 3% |
Iran, Islamic Republic of | 1 | 3% |
China | 1 | 3% |
Unknown | 34 | 87% |
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 13 | 33% |
Student > Master | 11 | 28% |
Researcher | 6 | 15% |
Lecturer | 1 | 3% |
Student > Bachelor | 1 | 3% |
Other | 4 | 10% |
Unknown | 3 | 8% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 33 | 85% |
Unspecified | 1 | 3% |
Physics and Astronomy | 1 | 3% |
Chemistry | 1 | 3% |
Unknown | 3 | 8% |