Login / Signup
Investigation of bypassing malware defences and malware detections.
Farid Daryabar
Ali Dehghantanha
Nur Izura Udzir
Published in:
IAS (2011)
Keyphrases
</>
malware detection
reverse engineering
detect malicious
control flow
malicious code
real time
databases
similarity measure
bayesian networks
multi agent
false positives
static analysis
dynamic analysis