Login / Signup
A graph-based model for malicious code detection exploiting dependencies of system-call groups.
Stavros D. Nikolopoulos
Iosif Polenakis
Published in:
CompSysTech (2015)
Keyphrases
</>
prediction model
real time
social networks
control system
e government