journal£ºProceedings of the 2012 ACM conference on Computer and communications security
Authors£ºLeyla Bilge; Tudor Dumitras
Published date£º2012-10-16
DOI£º10.1145/2382196.2382284
PDF link£ºhttps://dl.acm.org/doi/pdf/10.1145/2382196.2382284
Article link£ºhttp://dx.doi.org/10.1145/2382196.2382284
Article Source£ºACM¡£
Remark£º |