Login / Signup
Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.
Ahmed M. Elmisery
Mirela Sertovic
Mamoun Qasem
Published in:
ICSOC Workshops (2020)
Keyphrases
</>
real world
cost effective
real time
case study
similarity measure
multiscale
user interface