Login / Signup

Analysis on the Sequential Behavior of Malware Attacks.

Nur Rohman RosyidMasayuki OhruiHiroaki KikuchiPitikhate SooraksaMasato Terada
Published in: IEICE Trans. Inf. Syst. (2011)
Keyphrases
  • data sets
  • static analysis
  • dynamic analysis
  • database
  • artificial intelligence
  • reverse engineering
  • countermeasures
  • neural network
  • web services
  • case study
  • software engineering
  • behavior analysis
  • detect malicious