Login / Signup
Detecting malicious applications using system services request behavior.
Majid Salehi
Morteza Amini
Bruno Crispo
Published in:
MobiQuitous (2019)
Keyphrases
</>
detecting malicious
web services
peer to peer
service providers
network topology