Sign in

On the vulnerability of anti-malware solutions to DNS attacks.

Asaf NadlerRon BittonOleg BrodtAsaf Shabtai
Published in: Comput. Secur. (2022)
Keyphrases
  • buffer overflow
  • detect malicious
  • countermeasures
  • malicious code
  • malicious attacks
  • optimal solution
  • data mining
  • search algorithm
  • benchmark problems
  • security problems
  • security vulnerabilities
  • detecting malicious