Login / Signup
Malware Detection and Security Analysis Capabilities in a Continuous Integration / Delivery Context Using Assemblyline.
Wahab Almuhtadi
Surbhi Bahri
Wynn Fenwick
Liam Henderson
Liam Henley-Vachon
Joshua Mukasa
Published in:
ICCE (2021)
Keyphrases
</>
security analysis
malware detection
security requirements
public key
high security
malicious executables
smart card
anomaly detection
encryption scheme
authentication protocol
security model
application programming interface
information systems
low cost
cost effective
mutual authentication