Login / Signup
Malware Propagations in Wireless Ad Hoc Networks.
Bo Liu
Wanlei Zhou
Longxiang Gao
Haibo Zhou
Tom H. Luan
Sheng Wen
Published in:
IEEE Trans. Dependable Secur. Comput. (2018)
Keyphrases
</>
malware detection
reverse engineering
detect malicious
control flow
malicious code
metadata
dynamic analysis
databases
real world
social networks
computer vision
pattern recognition
relational databases
object oriented
static analysis