Login / Signup
An incentive system for reducing malware attacks.
James A. McHugh
Fadi P. Deek
Published in:
Commun. ACM (2005)
Keyphrases
</>
detect malicious
malicious code
detecting malicious
attack scenarios
countermeasures
static analysis
reverse engineering
data sets
malicious attacks
traffic analysis
information systems
image watermarking
computer security
attack detection
computer networks
neural network
database