Linked e-resources
Details
Table of Contents
ch. 1. The fundamental concepts
ch. 2. Computer networking
ch. 3. Intrusion detection and prevention systems (IDPSs)
ch. 4. Honeypots
ch. 5. Internet worms
ch. 6. Reading resources on automated signature generation systems
ch. 7. Signature generation algorithms for polymorphic worms
ch. 8. Zero-day polymorphic worm collection method
ch. 9. Developed signature generation algorithms.
ch. 2. Computer networking
ch. 3. Intrusion detection and prevention systems (IDPSs)
ch. 4. Honeypots
ch. 5. Internet worms
ch. 6. Reading resources on automated signature generation systems
ch. 7. Signature generation algorithms for polymorphic worms
ch. 8. Zero-day polymorphic worm collection method
ch. 9. Developed signature generation algorithms.