Login / Signup
Securing communication using function extraction technology for malicious code behavior analysis.
K. Vimal Kumar
Published in:
Comput. Secur. (2009)
Keyphrases
</>
behavior analysis
malicious code
anomaly detection
surveillance system
static analysis
data processing
case study
network traffic
behavioral model
information systems
object recognition
machine learning
reverse engineering
social insects