Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liang, Zhenkai | de |
dc.contributor.author | Sekar, R. | de |
dc.contributor.author | Sun, Weiqing | de |
dc.contributor.author | Venkatakrishnan, V. N. | de |
dc.date.accessioned | 2009-07-29T15:16:26Z | - |
dc.date.available | 2009-07-29T15:16:26Z | - |
dc.date.issued | 2009-07-29T15:16:26Z | - |
dc.identifier.uri | http://hdl.handle.net/2003/26286 | - |
dc.identifier.uri | http://dx.doi.org/10.17877/DE290R-2036 | - |
dc.language.iso | en | de |
dc.relation.ispartof | DIMVA 2008, July 10-11, 2008, Paris, France | en |
dc.relation.uri | http://dx.doi.org/10.1007/978-3-540-70542-0_9 | de |
dc.subject | malicious code | en |
dc.subject | sandboxing | en |
dc.subject | software installation | en |
dc.subject | untrusted code | en |
dc.subject.ddc | 004 | - |
dc.title | Expanding Malware Defense by Securing Software Installations | en |
dc.type | Text | de |
dc.type.publicationtype | conferenceObject | de |
dcterms.accessRights | open access | - |
Appears in Collections: | Presentations |
This item is protected by original copyright |
This item is protected by original copyright rightsstatements.org