Login / Signup
Obfuscation without the Vulnerabilities of Multilinear Maps.
Sanjam Garg
Pratyay Mukherjee
Akshayaram Srinivasan
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
higher order
reverse engineering
high order
neural network
malware detection
data transformation
control flow
information security
intrusion detection
dimensionality reduction
software engineering
security issues
static analysis
case study
learning algorithm
data sets
attack graph
attack graphs