Login / Signup

Code synchronization by morphological analysis.

Guillaume BonfanteJean-Yves MarionFabrice SabatierAurélien Thierry
Published in: MALWARE (2012)
Keyphrases
  • morphological analysis
  • concurrent programs
  • source code
  • case study
  • data sets
  • genetic algorithm
  • open source
  • unknown words