Login / Signup
Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection.
William Stone
Daeyoung Kim
Victor Youdom Kemmoe
Mingon Kang
Junggab Son
Published in:
IEEE Access (2020)
Keyphrases
</>
malware detection
malicious executables
data streams
anomaly detection
sliding window
application programming interface
information systems
image segmentation
training data
object oriented
open source
technology enhanced learning
ciphertext
encryption algorithm
stream cipher
encryption decryption