Login / Signup
Agent-Based Network Protection Against Malicious Code.
Martin Rehák
Michal Pechoucek
Jan Tozicka
Magdalena Prokopová
David Medvigy
Jiri Novotný
Published in:
CEEMAS (2007)
Keyphrases
</>
malicious code
network traffic
network model
computer networks
wireless sensor networks
peer to peer
communication networks
static analysis
neural network
data analysis
network structure
reverse engineering