Login / Signup
An Empirical Analysis of Malware Blacklists.
Marc Kührer
Thorsten Holz
Published in:
Prax. Inf.verarb. Kommun. (2012)
Keyphrases
</>
malware detection
reverse engineering
malicious code
detect malicious
control flow
static analysis
data sets
training data
database
software engineering
wireless sensor networks
dynamic analysis
object oriented
data structure
case study
website
computer vision
neural network
real time