Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX record conf/secitc/MoradS15
@inproceedings{DBLP:conf/secitc/MoradS15, author = {Idan Morad and Asaf Shabtai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Detecting Computers in Cyber Space Maliciously Exploited as {SSH} Proxies}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {201--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_14}, doi = {10.1007/978-3-319-27179-8\_14}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MoradS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.