Login / Signup
Code Graph for Malware Detection.
Kyoochang Jeong
Heejo Lee
Published in:
ICOIN (2008)
Keyphrases
</>
malware detection
application programming interface
malicious executables
anomaly detection
directed graph
graph representation
graph theory
graph structure
weighted graph
api calls
source code
structured data
information systems
network traffic
data mining
data model