An overview of stakcert framework in confronting worms attack
A procedure is one of the most important elements that should be emphasized when handling any incident related with the cyber world. It is easily forgotten by many organizations, IT administrator and users, especially when dealing with the worms attack. Using the incident response methodology as the...
Saved in:
Main Authors: | M.M., Saudi,, A.J., Cullen,, M.E., Woodward,, H.A., Hamid,, A.H., Abhalim, |
---|---|
Format: | Conference Paper |
Language: | en_US |
Published: |
2015
|
Subjects: | |
Online Access: | http://ddms.usim.edu.my/handle/123456789/9041 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Reverse engineering: EDOWA worm analysis and classification
by: M.M., Saudi, et al.
Published: (2015) -
STAKCERT worm relational model for worm detection
by: M.M., Saudi,, et al.
Published: (2015) -
Detecting worm attacks in cloud computing environment: Proof of concept
by: H.M., Kanaker, et al.
Published: (2015) -
EDOWA worm classification
by: Madihah, Mohd Saudi,, et al.
Published: (2015) -
Worm medicine
by: Jameson, Marni
Published: (2012)