Login / Signup

Mining specifications of malicious behavior.

Mihai ChristodorescuSomesh JhaChristopher Kruegel
Published in: ISEC (2008)
Keyphrases
  • malicious behavior
  • data mining
  • information systems
  • dynamic analysis
  • high level
  • data analysis
  • open source
  • mobile phone