Login / Signup

Attacking Malicious Code: A Report to the Infosec Research Council.

Gary McGrawJ. Gregory Morrisett
Published in: IEEE Softw. (2000)
Keyphrases
  • malicious code
  • static analysis
  • network traffic
  • reverse engineering
  • malicious behavior
  • intrusion detection
  • information security
  • feature selection
  • object recognition