Sign in

Malicious Behavior Detection using Windows Audit Logs.

Konstantin BerlinDavid SlaterJoshua Saxe
Published in: AISec@CCS (2015)
Keyphrases
  • malicious behavior
  • artificial intelligence
  • open source
  • mobile phone
  • anomaly detection
  • pattern matching