Login / Signup
Seeing through Network-Protocol Obfuscation.
Liang Wang
Kevin P. Dyer
Aditya Akella
Thomas Ristenpart
Thomas Shrimpton
Published in:
CCS (2015)
Keyphrases
</>
reverse engineering
static analysis
malware detection
data transformation
control flow
object oriented
information systems
high level
pattern recognition
data streams
pairwise
high dimensional
data processing
data flow