• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Run-Time Detection of Malicious Behavior Based on Exploit Decomposition Using Deep Learning: A Feasibility Study on SysJoker.

Thanasis TsakoulisEvangelos HaleplidisApostolos P. Fournaris
Published in: SAMOS (2023)
Keyphrases
  • deep learning
  • unsupervised feature learning
  • data sets
  • data mining
  • pattern recognition