Login / Signup

Redirecting Malware's Target Selection with Decoy Processes.

Sara SuttonGarret MichilliJulian L. Rrushi
Published in: DBSec (2019)
Keyphrases
  • selection mechanism
  • computational models
  • reverse engineering
  • real time
  • genetic algorithm
  • process model
  • control flow
  • information systems
  • decision trees
  • moving target