Login / Signup
A similarity based technique for detecting malicious executable files for computer forensics.
Jun-Hyung Park
Minsoo Kim
BongNam Noh
James B. D. Joshi
Published in:
IRI (2006)
Keyphrases
</>
detecting malicious
computer forensics
computer security
detect malicious
anti virus
digital forensics
web pages
multi agent
law enforcement
end hosts
network security
knowledge sharing
intrusion detection
databases
information security
network intrusion detection