Show simple item record

dc.contributor.authorWahid, A
dc.contributor.authorLeckie, C
dc.contributor.authorZhou, C
dc.contributor.editorXiang, Y
dc.contributor.editorlopez, J
dc.date.available2014-05-22T04:36:14Z
dc.date.issued2009-01-01
dc.identifierhttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000277507500049&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=d4d813f4571fa7d6246bdc0dfeca3a1c
dc.identifier.citationWahid, A., Leckie, C. & Zhou, C. (2009). Characterising the Evolution in Scanning Activity of Suspicious Hosts. Xiang, Y (Ed.) lopez, J (Ed.) NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, pp.344-350. IEEE. https://doi.org/10.1109/NSS.2009.13.
dc.identifier.isbn978-1-4244-5087-9
dc.identifier.urihttp://hdl.handle.net/11343/31921
dc.descriptionInternational Conference on Network and System Security (NSS)
dc.languageEnglish
dc.publisherIEEE
dc.source3rd International Conference on Network and System Security
dc.subjectComputer Software
dc.titleCharacterising the Evolution in Scanning Activity of Suspicious Hosts
dc.typeConference Paper
dc.identifier.doi10.1109/NSS.2009.13
melbourne.peerreviewPeer Reviewed
melbourne.affiliationThe University of Melbourne
melbourne.affiliation.departmentComputer Science and Software Engineering
melbourne.source.titleNSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY
melbourne.source.pages344-350
melbourne.publicationid135816
melbourne.elementsid316979
melbourne.contributor.authorLeckie, Christopher
melbourne.contributor.authorZhou, Chenfeng
melbourne.contributor.authorWAHID, ALIF
melbourne.event.locationSurfers Paradise, AUSTRALIA
melbourne.accessrightsThis item is currently not available from this repository


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record