Login / Signup
Identification of toolchains used to build IoT malware with statically linked libraries.
Shu Akabane
Takeshi Okamoto
Published in:
KES (2021)
Keyphrases
</>
management system
neural network
cloud computing
databases
static analysis
big data
digital libraries
multimedia
wireless sensor networks
metadata
data management
information systems
information retrieval
mobile computing
database
automatic identification
control flow
identification rate
malicious code