Spatio-temporal mining of software adoption & penetration
How does malware propagate? Does it form spikes over time? Does it resemble the propagation pattern of benign files, such as software patches? Does it spread uniformly over countries? How long does it take for a URL that distributes malware to be detected and shut down? In this work, we answer these...
Saved in:
Published in | 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) pp. 878 - 885 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
ACM and IEEE
01.08.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!