Login / Signup

Investigation of bypassing malware defences and malware detections.

Farid DaryabarAli DehghantanhaNur Izura Udzir
Published in: IAS (2011)
Keyphrases
  • malware detection
  • reverse engineering
  • detect malicious
  • control flow
  • malicious code
  • real time
  • databases
  • similarity measure
  • bayesian networks
  • multi agent
  • false positives
  • static analysis
  • dynamic analysis