Login / Signup

Malware: Troy revisited.

Richard Ford
Published in: Comput. Secur. (1999)
Keyphrases
  • image segmentation
  • malware detection
  • reverse engineering
  • computer vision
  • malicious code
  • static analysis
  • control flow
  • detect malicious
  • database
  • dynamic analysis