Skip to main content
Erschienen in: World Wide Web 2/2020

17.01.2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies

verfasst von: Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi

Erschienen in: World Wide Web | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malware from goodware. However, existing malware hunting approaches generally focus on a single particular view, such as using dynamic information or opcodes only. While single-view malware hunting systems may provide lean and optimized basis for detecting a specific type of malware, their performance can be significantly limited when dealing with other types of malware; thus, making it trivial for an advanced attacker to develop malware that simply obfuscates features monitored by a single-view malware detection system. To address these limitations, we propose a multi-view learning method that uses multiple views including OpCodes, ByteCodes, header information, permission, attacker’s intent and API call to hunt malicious programs. Our system automatically assigns weights to different views to optimize detection in different environment. Using experiments conducted on various Windows, Android and Internet of Things (IoT) platforms, we demonstrate that our method offers high accuracy with a low false positive rate on these case study platforms. Moreover, we also investigate the robustness of detection against weak views (features with low power of discrimination). The proposed method is the first malware threat hunting method that can be applied to different platforms, at the time of this research, and it is considerably difficult for attackers to evade detection (since it requires attackers to obfuscate multiple different views).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp 23–26 (2014) Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp 23–26 (2014)
2.
Zurück zum Zitat Azmoodeh, A., Dehghantanha, A., Choo, K.K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. (2018) Azmoodeh, A., Dehghantanha, A., Choo, K.K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. (2018)
3.
Zurück zum Zitat Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.K.R.: Detecting crypto-ransomware in iot networks based on energy consumption footprint. J. Ambient. Intell. Humaniz. Comput., 1–12 (2017) Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.K.R.: Detecting crypto-ransomware in iot networks based on energy consumption footprint. J. Ambient. Intell. Humaniz. Comput., 1–12 (2017)
4.
Zurück zum Zitat Bai, J., Wang, J.: Improving malware detection using multi-view ensemble learning. Secur. Commun. Netw. 9(17), 4227–4241 (2016)CrossRef Bai, J., Wang, J.: Improving malware detection using multi-view ensemble learning. Secur. Commun. Netw. 9(17), 4227–4241 (2016)CrossRef
6.
Zurück zum Zitat Bishop, C.M., et al.: Neural Networks for Pattern Recognition. Oxford University Press, London (1995)MATH Bishop, C.M., et al.: Neural Networks for Pattern Recognition. Oxford University Press, London (1995)MATH
7.
Zurück zum Zitat Chakraborty, T., Pierazzi, F., Subrahmanian, V.: Ec2: ensemble clustering and classification for predicting android malware families. IEEE Trans. Dependable Secure Comput. (1), 1–1 (2017) Chakraborty, T., Pierazzi, F., Subrahmanian, V.: Ec2: ensemble clustering and classification for predicting android malware families. IEEE Trans. Dependable Secure Comput. (1), 1–1 (2017)
8.
Zurück zum Zitat Cui, H., Zhou, Y., Wang, C., Li, Q., Ren, K.: Towards privacy-preserving malware detection systems for android. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp 545–552 (2018) Cui, H., Zhou, Y., Wang, C., Li, Q., Ren, K.: Towards privacy-preserving malware detection systems for android. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp 545–552 (2018)
9.
Zurück zum Zitat Darabian, H., Dehghantanha, A., Hashemi, S., Homayoun, S., Choo, K.K.R.: An opcode-based technique for polymorphic internet of things malware detection. Concurrency and Computation: Practice and Experience, e5173 (2019) Darabian, H., Dehghantanha, A., Hashemi, S., Homayoun, S., Choo, K.K.R.: An opcode-based technique for polymorphic internet of things malware detection. Concurrency and Computation: Practice and Experience, e5173 (2019)
10.
Zurück zum Zitat Farrokhmanesh, M., Hamzeh, A.: Music classification as a new approach for malware detection. Journal of Computer Virology and Hacking Techniques, 1–20 (2018) Farrokhmanesh, M., Hamzeh, A.: Music classification as a new approach for malware detection. Journal of Computer Virology and Hacking Techniques, 1–20 (2018)
11.
Zurück zum Zitat Garcia, J., Hammad, M., Pedrood, B., Bagheri-Khaligh, A., Malek, S.: Obfuscation-Resilient, Efficient, and Accurate Detection and Family Identification of Android Malware. Department of Computer Science, George Mason University, Tech. Rep (2015) Garcia, J., Hammad, M., Pedrood, B., Bagheri-Khaligh, A., Malek, S.: Obfuscation-Resilient, Efficient, and Accurate Detection and Family Identification of Android Malware. Department of Computer Science, George Mason University, Tech. Rep (2015)
12.
Zurück zum Zitat Guo, J., Zhu, W.: Partial multi-view outlier detection based on collective learning. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018) Guo, J., Zhu, W.: Partial multi-view outlier detection based on collective learning. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)
13.
Zurück zum Zitat Guo, S., Yuan, Q., Lin, F., Wang, F., Ban, T.: A malware detection algorithm based on multi-view fusion. In: International Conference on Neural Information Processing, pp 259–266. Springer (2010) Guo, S., Yuan, Q., Lin, F., Wang, F., Ban, T.: A malware detection algorithm based on multi-view fusion. In: International Conference on Neural Information Processing, pp 259–266. Springer (2010)
14.
Zurück zum Zitat HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)CrossRef HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)CrossRef
15.
Zurück zum Zitat Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Int. Sys. Appl. 13(4), 18–28 (1998)CrossRef Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Int. Sys. Appl. 13(4), 18–28 (1998)CrossRef
16.
Zurück zum Zitat Hopkins, M., Dehghantanha, A.: Exploit kits: the production line of the cybercrime economy?. In: 2015 Second International Conference on Information Security and Cyber Forensics (Infosec), pp 23–27. IEEE (2015) Hopkins, M., Dehghantanha, A.: Exploit kits: the production line of the cybercrime economy?. In: 2015 Second International Conference on Information Security and Cyber Forensics (Infosec), pp 23–27. IEEE (2015)
17.
Zurück zum Zitat Hu, Q., Zhu, P., Yang, Y., Yu, D.: Large-margin nearest neighbor classifiers via sample weight learning. Neurocomputing 74(4), 656–660 (2011)CrossRef Hu, Q., Zhu, P., Yang, Y., Yu, D.: Large-margin nearest neighbor classifiers via sample weight learning. Neurocomputing 74(4), 656–660 (2011)CrossRef
18.
Zurück zum Zitat Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: Pindroid: a novel android malware detection system using ensemble learning methods. Comput. Secur. 68, 36–46 (2017)CrossRef Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: Pindroid: a novel android malware detection system using ensemble learning methods. Comput. Secur. 68, 36–46 (2017)CrossRef
19.
Zurück zum Zitat Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, vol. 14, pp 1137–1145. Montreal, Canada (1995) Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, vol. 14, pp 1137–1145. Montreal, Canada (1995)
20.
Zurück zum Zitat Maiorca, D., Biggio, B., Giacinto, G.: Towards adversarial malware detection: lessons learned from pdf-based attacks. ACM Computing Surveys (CSUR) 52(4), 78 (2019)CrossRef Maiorca, D., Biggio, B., Giacinto, G.: Towards adversarial malware detection: lessons learned from pdf-based attacks. ACM Computing Surveys (CSUR) 52(4), 78 (2019)CrossRef
21.
Zurück zum Zitat Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to android malware detection and malicious code localization. Empir. Softw. Eng. 23(3), 1222–1274 (2018)CrossRef Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to android malware detection and malicious code localization. Empir. Softw. Eng. 23(3), 1222–1274 (2018)CrossRef
22.
Zurück zum Zitat Narayanan, A., Soh, C., Chen, L., Liu, Y., Wang, L.: Apk2vec: semi-supervised multi-view representation learning for profiling android applications. In: 2018 IEEE International Conference on Data Mining (ICDM), pp 357–366 (2018) Narayanan, A., Soh, C., Chen, L., Liu, Y., Wang, L.: Apk2vec: semi-supervised multi-view representation learning for profiling android applications. In: 2018 IEEE International Conference on Data Mining (ICDM), pp 357–366 (2018)
23.
Zurück zum Zitat Nari, S., Ghorbani, A.A.: Automated malware classification based on network behavior. In: 2013 International Conference on Computing, Networking and Communications (ICNC), pp 642–647. IEEE (2013) Nari, S., Ghorbani, A.A.: Automated malware classification based on network behavior. In: 2013 International Conference on Computing, Networking and Communications (ICNC), pp 642–647. IEEE (2013)
24.
Zurück zum Zitat Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Comput. Secur. 87, 101573 (2019)CrossRef Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Comput. Secur. 87, 101573 (2019)CrossRef
25.
Zurück zum Zitat O’Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7 (5), 321–327 (2018)CrossRef O’Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7 (5), 321–327 (2018)CrossRef
26.
Zurück zum Zitat Prayudi, Y., Riadi, I., et al.: Implementation of malware analysis using static and dynamic analysis method. Int. J. Comput. Appl. 117(6) (2015) Prayudi, Y., Riadi, I., et al.: Implementation of malware analysis using static and dynamic analysis method. Int. J. Comput. Appl. 117(6) (2015)
27.
Zurück zum Zitat Raff, E., Sylvester, J., Nicholas, C.: Learning the pe header, malware detection with minimal domain knowledge. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 121–132. ACM (2017) Raff, E., Sylvester, J., Nicholas, C.: Learning the pe header, malware detection with minimal domain knowledge. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 121–132. ACM (2017)
28.
Zurück zum Zitat Rokach, L.: Ensemble-based classifiers. Artif. Intell. Rev. 33(1-2), 1–39 (2010)CrossRef Rokach, L.: Ensemble-based classifiers. Artif. Intell. Rev. 33(1-2), 1–39 (2010)CrossRef
29.
Zurück zum Zitat Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv:1802.10135 (2018) Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv:1802.​10135 (2018)
30.
Zurück zum Zitat Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: 2012 European Intelligence and Security Informatics Conference, pp 141–147. IEEE (2012) Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: 2012 European Intelligence and Security Informatics Conference, pp 141–147. IEEE (2012)
31.
Zurück zum Zitat Salehi, Z., Sami, A., Ghiasi, M.: Maar: robust features to detect malicious activity based on api calls, their arguments and return values. Eng. Appl. Artif. Intel. 59, 93–102 (2017)CrossRef Salehi, Z., Sami, A., Ghiasi, M.: Maar: robust features to detect malicious activity based on api calls, their arguments and return values. Eng. Appl. Artif. Intel. 59, 93–102 (2017)CrossRef
32.
Zurück zum Zitat Sami, A., Yadegari, B., Rahimi, H., Peiravian, N., Hashemi, S., Hamze, A.: Malware detection based on mining api calls. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp 1020–1025. ACM (2010) Sami, A., Yadegari, B., Rahimi, H., Peiravian, N., Hashemi, S., Hamze, A.: Malware detection based on mining api calls. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp 1020–1025. ACM (2010)
33.
Zurück zum Zitat Sarma, BP, Li, N, Gates, C, Potharaju, R, Nita-Rotaru, C, Molloy, I: Android permissions: a perspective combining risks and benefits Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp 13–22, ACM (2012) Sarma, BP, Li, N, Gates, C, Potharaju, R, Nita-Rotaru, C, Molloy, I: Android permissions: a perspective combining risks and benefits Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp 13–22, ACM (2012)
34.
Zurück zum Zitat Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: a static-dynamic approach for machine-learning-based malware detection. In: International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions, pp 271–280. Springer (2013) Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: a static-dynamic approach for machine-learning-based malware detection. In: International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions, pp 271–280. Springer (2013)
35.
Zurück zum Zitat Shalaginov, A., Banin, S., Dehghantanha, A., Franke, K.: Machine learning aided static malware analysis: a survey and tutorial. Cyber Threat Intelligence, 7–45 (2018) Shalaginov, A., Banin, S., Dehghantanha, A., Franke, K.: Machine learning aided static malware analysis: a survey and tutorial. Cyber Threat Intelligence, 7–45 (2018)
36.
Zurück zum Zitat Sheen, S., Anitha, R., Sirisha, P.: Malware detection by pruning of parallel ensembles using harmony search. Pattern Recogn. Lett. 34(14), 1679–1686 (2013)CrossRef Sheen, S., Anitha, R., Sirisha, P.: Malware detection by pruning of parallel ensembles using harmony search. Pattern Recogn. Lett. 34(14), 1679–1686 (2013)CrossRef
37.
Zurück zum Zitat Shijo, P., Salim, A.: Integrated static and dynamic analysis for malware detection. Procedia Comput. Sci. 46, 804–811 (2015)CrossRef Shijo, P., Salim, A.: Integrated static and dynamic analysis for malware detection. Procedia Comput. Sci. 46, 804–811 (2015)CrossRef
38.
Zurück zum Zitat Sikorski, M., Honig, A.: Pratical Malware Analysis O’Reilly (2012) Sikorski, M., Honig, A.: Pratical Malware Analysis O’Reilly (2012)
39.
Zurück zum Zitat Singh, A., Dutta, D., Saha, A.: Migan: malware image synthesis using gans. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp 10033–10034 (2019)CrossRef Singh, A., Dutta, D., Saha, A.: Migan: malware image synthesis using gans. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp 10033–10034 (2019)CrossRef
40.
Zurück zum Zitat Skolka, P., Staicu, C.A., Pradel, M.: Anything to hide? Studying minified and obfuscated code in the web. In: The World Wide Web Conference, pp 1735–1746. ACM (2019) Skolka, P., Staicu, C.A., Pradel, M.: Anything to hide? Studying minified and obfuscated code in the web. In: The World Wide Web Conference, pp 1735–1746. ACM (2019)
41.
Zurück zum Zitat Steinwart, I., Christmann, A.: Support Vector Machines. Springer, Berlin (2008)MATH Steinwart, I., Christmann, A.: Support Vector Machines. Springer, Berlin (2008)MATH
42.
Zurück zum Zitat Sun, S.: A survey of multi-view machine learning. Neural Comput. Applic. 23 (7-8), 2031–2038 (2013)CrossRef Sun, S.: A survey of multi-view machine learning. Neural Comput. Applic. 23 (7-8), 2031–2038 (2013)CrossRef
43.
Zurück zum Zitat Taheri, M., Azad, H., Ziarati, K., Sanaye, R.: A quadratic margin-based model for weighting fuzzy classification rules inspired by support vector machines. Iranian J. Fuzzy Sys. 10(4), 41–55 (2013)MathSciNetMATH Taheri, M., Azad, H., Ziarati, K., Sanaye, R.: A quadratic margin-based model for weighting fuzzy classification rules inspired by support vector machines. Iranian J. Fuzzy Sys. 10(4), 41–55 (2013)MathSciNetMATH
44.
Zurück zum Zitat Wang, Q., Guo, W., Zhang, K., Ororbia, II, Xing, A.G., Liu, X., Giles, C.L.: Adversary resistant deep neural networks with an application to malware detection. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1145–1153. ACM (2017) Wang, Q., Guo, W., Zhang, K., Ororbia, II, Xing, A.G., Liu, X., Giles, C.L.: Adversary resistant deep neural networks with an application to malware detection. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1145–1153. ACM (2017)
45.
46.
Zurück zum Zitat Xu, Z., Sun, S.: An algorithm on multi-view adaboost. In: International Conference on Neural Information Processing, pp 355–362. Springer (2010) Xu, Z., Sun, S.: An algorithm on multi-view adaboost. In: International Conference on Neural Information Processing, pp 355–362. Springer (2010)
47.
Zurück zum Zitat Yakura, H., Shinozaki, S., Nishimura, R., Oyama, Y., Sakuma, J.: Neural malware analysis with attention mechanism. Comput. Secur. 87, 101592 (2019)CrossRef Yakura, H., Shinozaki, S., Nishimura, R., Oyama, Y., Sakuma, J.: Neural malware analysis with attention mechanism. Comput. Secur. 87, 101592 (2019)CrossRef
48.
Zurück zum Zitat Ye, Y., Hou, S., Chen, L., Lei, J., Wan, W., Wang, J., Xiong, Q., Shao, F.: Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection. In: 28th International Joint Conference on Artificial Intelligence (IJCAI), 2019 (2019) Ye, Y., Hou, S., Chen, L., Lei, J., Wan, W., Wang, J., Xiong, Q., Shao, F.: Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection. In: 28th International Joint Conference on Artificial Intelligence (IJCAI), 2019 (2019)
49.
Zurück zum Zitat Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR) 50(3), 41 (2017)CrossRef Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR) 50(3), 41 (2017)CrossRef
50.
Zurück zum Zitat You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), pp 297–300. IEEE (2010) You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), pp 297–300. IEEE (2010)
51.
Zurück zum Zitat Zhao, J., Xie, X., Xu, X., Sun, S.: Multi-view learning overview: recent progress and new challenges. Information Fusion 38, 43–54 (2017)CrossRef Zhao, J., Xie, X., Xu, X., Sun, S.: Multi-view learning overview: recent progress and new challenges. Information Fusion 38, 43–54 (2017)CrossRef
52.
Zurück zum Zitat Zhou, D., He, J., Candan, K.S., Davulcu, H.: Muvir: multi-view rare category detection. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015) Zhou, D., He, J., Candan, K.S., Davulcu, H.: Muvir: multi-view rare category detection. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Metadaten
Titel
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
verfasst von
Hamid Darabian
Ali Dehghantanha
Sattar Hashemi
Mohammad Taheri
Amin Azmoodeh
Sajad Homayoun
Kim-Kwang Raymond Choo
Reza M. Parizi
Publikationsdatum
17.01.2020
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 2/2020
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-019-00755-0

Weitere Artikel der Ausgabe 2/2020

World Wide Web 2/2020 Zur Ausgabe

Premium Partner