Login / Signup
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Ying-Dar Lin
Tzung-Bi Shih
Yu-Sung Wu
Yuan-Cheng Lai
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
network traffic
malicious code
static analysis
dynamic analysis
intrusion detection
covert channel
network monitoring
machine learning
anomaly detection
dynamically changing
databases
feature selection
data analysis
network management
traffic data