Login / Signup

Analyzing Malware Based on Volatile Memory.

Liang HuShinan SongXiaolu ZhangZhenzhen XieXiangyu MengKuo Zhao
Published in: J. Networks (2013)
Keyphrases
  • main memory
  • memory size
  • high levels
  • memory footprint
  • neural network
  • image sequences
  • reverse engineering
  • computational power
  • memory usage
  • computing power
  • memory space
  • low memory