Login / Signup
A Consistently-Executing Graph-Based Approach for Malware Packer Identification.
Xingwei Li
Zheng Shan
Fudong Liu
Yihang Chen
Yifan Hou
Published in:
IEEE Access (2019)
Keyphrases
</>
graph theory
directed graph
graph structure
graph representation
random walk
connected components
dependency graph
weighted graph
reverse engineering
graph construction
graph based algorithm
database
graph clustering
undirected graph
directed acyclic graph
bipartite graph
software engineering