Encryption and Re-Randomization Techniques for Malware Propagation.
Ahsan Rasheed AbbasiMehreen AfzalWaseem IqbalShynar MussiraliyevaFawad KhanAwais Ur RehmanPublished in: IEEE Access (2021)
Keyphrases
- privacy preserving
- malware detection
- wave propagation
- reverse engineering
- encryption algorithms
- multimedia streaming
- high security
- encryption algorithm
- digital signature
- encryption decryption
- data encryption
- malicious code
- propagation model
- real time
- encryption scheme
- secret key
- case study
- search engine
- genetic algorithm
- neural network
- data sets