Login / Signup
Redirecting Malware's Target Selection with Decoy Processes.
Sara Sutton
Garret Michilli
Julian L. Rrushi
Published in:
DBSec (2019)
Keyphrases
</>
selection mechanism
computational models
reverse engineering
real time
genetic algorithm
process model
control flow
information systems
decision trees
moving target