Login / Signup
Run-Time Detection of Malicious Behavior Based on Exploit Decomposition Using Deep Learning: A Feasibility Study on SysJoker.
Thanasis Tsakoulis
Evangelos Haleplidis
Apostolos P. Fournaris
Published in:
SAMOS (2023)
Keyphrases
</>
deep learning
unsupervised feature learning
data sets
data mining
pattern recognition