Mostra i principali dati dell'item

dc.contributor.advisorVlachos, Vasileiosen
dc.creatorChristoforidis, Christoforosen
dc.date.accessioned2020-07-12T09:23:52Z
dc.date.available2020-07-12T09:23:52Z
dc.date.issued2014
dc.identifier.other20958
dc.identifier.urihttp://hdl.handle.net/11615/52928
dc.identifier.urihttp://dx.doi.org/10.26253/heal.uth.8890
dc.description.abstractAlong with the Internet breakthrough, on November 2, 1988, Robert Tappan Morris unleashed what became known as the Morris worm. Besides other known malware at that time, Morris worm managed to disrupt 6000 computer systems or else the one tenth of all comen
dc.language.isoenen
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/en
dc.subjectinformation securityen
dc.subjectP2Pen
dc.subjectworm protectionen
dc.titleCrowdsourcing intelligence in security applicationsen
dc.typemasterThesisen
heal.recordProviderΠανεπιστήμιο Θεσσαλίας - Βιβλιοθήκη και Κέντρο Πληροφόρησηςel
heal.academicPublisherΤΕΙ Θεσσαλίας. Τμήμα Μηχανικών Πληροφορικής T.E.el
heal.academicPublisherIDteilar
heal.fullTextAvailabilityTRUEen
dc.rights.accessRightsfreeen


Files in questo item

Thumbnail

Questo item appare nelle seguenti collezioni

Mostra i principali dati dell'item

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International