Login / Signup
Analysis on the Sequential Behavior of Malware Attacks.
Nur Rohman Rosyid
Masayuki Ohrui
Hiroaki Kikuchi
Pitikhate Sooraksa
Masato Terada
Published in:
IEICE Trans. Inf. Syst. (2011)
Keyphrases
</>
data sets
static analysis
dynamic analysis
database
artificial intelligence
reverse engineering
countermeasures
neural network
web services
case study
software engineering
behavior analysis
detect malicious