Login / Signup
Computing the behavior of malware.
Richard C. Linger
Mark G. Pleszkoch
Kirk Sayre
Tim Daly
Published in:
CSIIRW (2010)
Keyphrases
</>
knowledge base
behavior patterns
reverse engineering
behavior analysis
dynamic analysis
real time
real world
data mining
genetic algorithm
search engine
information systems
case study
data structure
hidden markov models
software engineering