![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Chang Arthur Jung-Ting Yeh Quey-Jen
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.14, Iss.4, 2006-08, pp. : 343-360
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
ISPs and malicious software (malware) security threats
SourceOECD Science & Information Technology, Vol. 2011, Iss. 15, 2011-09 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)