Login / Signup
Analyzing Malware Based on Volatile Memory.
Liang Hu
Shinan Song
Xiaolu Zhang
Zhenzhen Xie
Xiangyu Meng
Kuo Zhao
Published in:
J. Networks (2013)
Keyphrases
</>
main memory
memory size
high levels
memory footprint
neural network
image sequences
reverse engineering
computational power
memory usage
computing power
memory space
low memory