Login / Signup
Mining specifications of malicious behavior.
Mihai Christodorescu
Somesh Jha
Christopher Kruegel
Published in:
ISEC (2008)
Keyphrases
</>
malicious behavior
data mining
information systems
dynamic analysis
high level
data analysis
open source
mobile phone