Login / Signup

A graph-based model for malicious code detection exploiting dependencies of system-call groups.

Stavros D. NikolopoulosIosif Polenakis
Published in: CompSysTech (2015)
Keyphrases
  • prediction model
  • real time
  • social networks
  • control system
  • e government