Login / Signup

Detecting malicious applications using system services request behavior.

Majid SalehiMorteza AminiBruno Crispo
Published in: MobiQuitous (2019)
Keyphrases
  • detecting malicious
  • web services
  • peer to peer
  • service providers
  • network topology