Login / Signup
Empirical evaluation of authorship obfuscation using JGAAP.
Patrick Juola
Darren Vescovi
Published in:
AISec (2010)
Keyphrases
</>
empirical evaluation
reverse engineering
static analysis
authorship attribution
writing style
control flow
data transformation
open source
malware detection
database
email
video sequences
clustering algorithm
multimedia
data mining
real world
data sets