A Survey on Cross-Architectural IoT Malware Threat Hunting.
Anandharaju Durai RajuIbrahim Y. AbualhaolRonnie Salvador GiagoneYang ZhouShengqiang HuangPublished in: IEEE Access (2021)
Keyphrases
- management system
- software architecture
- big data
- information retrieval
- malware detection
- cloud computing
- countermeasures
- intrusion detection
- reverse engineering
- detect malicious
- database
- malicious code
- architectural design
- control flow
- static analysis
- distributed systems
- object oriented
- high level
- social networks
- databases