Login / Signup
Maximal incompleteness as obfuscation potency.
Roberto Giacobazzi
Isabella Mastroeni
Mila Dalla Preda
Published in:
Formal Aspects Comput. (2017)
Keyphrases
</>
incomplete information
reverse engineering
data sets
static analysis
image processing
missing values
control flow
mining maximal
neural network
machine learning
relational databases
data transformation
malware detection