[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/apsitt/KamiyaANSKT15>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Hiroshi_Kurakami>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Kazufumi_Aoki>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Kazunori_Kamiya>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Kensuke_Nakata>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Masaki_Tanikawa>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Toru_Sato>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FAPSITT.2015.7217113>
foaf:homepage <https://doi.org/10.1109/APSITT.2015.7217113>
dc:identifier DBLP conf/apsitt/KamiyaANSKT15 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FAPSITT.2015.7217113 (xsd:string)
dcterms:issued 2015 (xsd:gYear)
rdfs:label The method of detecting malware-infected hosts analyzing firewall and proxy logs. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Hiroshi_Kurakami>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Kazufumi_Aoki>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Kazunori_Kamiya>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Kensuke_Nakata>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Masaki_Tanikawa>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Toru_Sato>
swrc:pages 1-3 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/apsitt/2015>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/apsitt/KamiyaANSKT15/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/apsitt/KamiyaANSKT15>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/apsitt/apsitt2015.html#KamiyaANSKT15>
rdfs:seeAlso <https://doi.org/10.1109/APSITT.2015.7217113>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/apsitt>
dc:title The method of detecting malware-infected hosts analyzing firewall and proxy logs. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document