Login / Signup

Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.

Ahmed M. ElmiseryMirela SertovicMamoun Qasem
Published in: ICSOC Workshops (2020)
Keyphrases
  • real world
  • cost effective
  • real time
  • case study
  • similarity measure
  • multiscale
  • user interface