Login / Signup

Determining vulnerability resolution time by examining malware proliferation rates.

Jeremy D. SeidemanBilal KhanGhassen Ben Brahim
Published in: IWCMC (2013)
Keyphrases
  • high resolution
  • malware detection
  • low resolution
  • real time
  • consequence finding
  • database
  • data sets
  • information systems
  • reverse engineering
  • risk assessment
  • control flow
  • image resolution