Ahmed F. Shosha, Joshua James, Pavel Gladyshev. A Novel Methodology for Malware Intrusion Attack Path Reconstruction. In Pavel Gladyshev, Marcus K. Rogers, editors, Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 131-140, Springer, 2011. [doi]
@inproceedings{ShoshaJG11, title = {A Novel Methodology for Malware Intrusion Attack Path Reconstruction}, author = {Ahmed F. Shosha and Joshua James and Pavel Gladyshev}, year = {2011}, doi = {10.1007/978-3-642-35515-8_11}, url = {http://dx.doi.org/10.1007/978-3-642-35515-8_11}, researchr = {https://researchr.org/publication/ShoshaJG11}, cites = {0}, citedby = {0}, pages = {131-140}, booktitle = {Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, editor = {Pavel Gladyshev and Marcus K. Rogers}, volume = {88}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, publisher = {Springer}, isbn = {978-3-642-35514-1}, }