Login / Signup

Synthesizing near-optimal malware specifications from suspicious behaviors.

Somesh JhaMatthew FredriksonMihai ChristodorescuReiner SailerXifeng Yan
Published in: MALWARE (2013)
Keyphrases