Sign in

Transformation Methodology of Binary Executables to Run on Bare Machines.

Navid OrdouieRasha AlmajedRamesh K. KarneAlexander L. WijesinhaJoel WeymouthNirmala Soundararajan
Published in: CATA (2020)
Keyphrases
  • similarity measure
  • binary data
  • genetic algorithm
  • social networks
  • image processing
  • case study
  • hamming distance
  • non binary
  • multi valued
  • malware detection
  • malicious executables