Skip to main content

Table 5 Finding of a system infected by malware

From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems