Mining for Malware - There's Gold in Them Thar Proxy Logs!

This paper is about identifying sources of malware and lowering the threat by taking action.
By
Joe Griffin
November 17, 2008

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg