Login / Signup
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.
Yong Tang
Bin Xiao
Xicheng Lu
Published in:
Comput. Secur. (2009)
Keyphrases
</>
computationally efficient
data mining
highly accurate
database
machine learning
text mining
automatically generate
real time
neural network
artificial intelligence
high quality
data analysis
computational biology