Login / Signup

Run-Time Detection of Malicious Behavior Based on Exploit Decomposition Using Deep Learning: A Feasibility Study on SysJoker.

Thanasis TsakoulisEvangelos HaleplidisApostolos P. Fournaris
Published in: SAMOS (2023)
Keyphrases
  • deep learning
  • unsupervised feature learning
  • data sets
  • data mining
  • pattern recognition