A Novel Methodology for Malware Intrusion Attack Path Reconstruction

Ahmed F. Shosha, Joshua James, Pavel Gladyshev. A Novel Methodology for Malware Intrusion Attack Path Reconstruction. In Pavel Gladyshev, Marcus K. Rogers, editors, Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 131-140, Springer, 2011. [doi]

@inproceedings{ShoshaJG11,
  title = {A Novel Methodology for Malware Intrusion Attack Path Reconstruction},
  author = {Ahmed F. Shosha and Joshua James and Pavel Gladyshev},
  year = {2011},
  doi = {10.1007/978-3-642-35515-8_11},
  url = {http://dx.doi.org/10.1007/978-3-642-35515-8_11},
  researchr = {https://researchr.org/publication/ShoshaJG11},
  cites = {0},
  citedby = {0},
  pages = {131-140},
  booktitle = {Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers},
  editor = {Pavel Gladyshev and Marcus K. Rogers},
  volume = {88},
  series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
  publisher = {Springer},
  isbn = {978-3-642-35514-1},
}