Login / Signup
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory
Jungwon Kim
Julie Greensmith
Jamie Twycross
Uwe Aickelin
Published in:
CoRR (2010)
Keyphrases
</>
malicious code
static analysis
detection method
false positives
automatic detection
false alarms
detection accuracy
detection algorithm
artificial immune system
network traffic
reverse engineering
immune systems
case study
object detection
probabilistic model
feature space
data analysis
training data