Login / Signup

Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.

Katsunari YoshiokaDaisuke InoueMasashi EtoYuji HoshizawaHiroki NogawaKoji Nakao
Published in: IEICE Trans. Inf. Syst. (2009)
Keyphrases
  • statistical analysis
  • image analysis
  • anomaly detection
  • real time
  • information retrieval
  • standard model