Login / Signup
Identification of malware activities with rules.
Bartosz Jasiul
Joanna Sliwa
Kamil Gleba
Marcin Szpyrka
Published in:
FedCSIS (2014)
Keyphrases
</>
reverse engineering
rule sets
business rules
machine learning
production rules
rule discovery
data mining
case study
computer systems
decision rules
activity recognition
classification rules
static analysis
rule generation
malware detection