Login / Signup

Vendor Malware: Detection Limits and Mitigation.

Olav LysneKjell Jørgen HoleChristian OtterstadØyvind YtrehusRaymond AarsethJorgen Tellnes
Published in: Computer (2016)
Keyphrases
  • malware detection
  • malicious executables
  • anomaly detection
  • application programming interface
  • risk management
  • database
  • clustering algorithm
  • object oriented
  • database management systems
  • anti virus