Stealthy malware traffic - Not as innocent as it looks.
Xingsi ZhongYu FuLu YuRichard R. BrooksGanesh Kumar VenayagamoorthyPublished in: MALWARE (2015)
Keyphrases
- network traffic
- traffic flow
- control flow
- malware detection
- traffic volume
- road traffic
- urban traffic
- detect malicious
- malicious code
- reverse engineering
- traffic conditions
- intelligent transportation systems
- flow control
- traffic congestion
- internet traffic
- traffic control
- traffic information
- traffic analysis
- data flow
- road network
- computer networks
- data sets