Skip to main content

Mining for Malware - There's Gold in Them Thar Proxy Logs!

This paper is about identifying sources of malware and lowering the threat by taking action.

32959 (PDF, 1.98MB)

17 Nov 2008
ByJoe Griffin
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.