Login / Signup
Detecting metamorphic malwares using code graphs.
Jusuk Lee
Kyoochang Jeong
Heejo Lee
Published in:
SAC (2010)
Keyphrases
</>
directed graph
malware detection
detect malicious
source code
graph theory
graph theoretic
series parallel
graph clustering
java programs
software systems
search algorithm
complex structures
real time
static analysis
graph mining
graph structures
graph matching
structured objects