Login / Signup
Malware: Troy revisited.
Richard Ford
Published in:
Comput. Secur. (1999)
Keyphrases
</>
image segmentation
malware detection
reverse engineering
computer vision
malicious code
static analysis
control flow
detect malicious
database
dynamic analysis