Login / Signup
Weaponised malware: how criminals use digital certificates to cripple your organisation.
Jeff Hudson
Published in:
Netw. Secur. (2011)
Keyphrases
</>
public key infrastructure
malware detection
access control
digital media
information retrieval
knowledge management
reverse engineering
digital content
public key
digital topology
data sets
social networks
case study
law enforcement
crime investigation