Login / Signup
Determining vulnerability resolution time by examining malware proliferation rates.
Jeremy D. Seideman
Bilal Khan
Ghassen Ben Brahim
Published in:
IWCMC (2013)
Keyphrases
</>
high resolution
malware detection
low resolution
real time
consequence finding
database
data sets
information systems
reverse engineering
risk assessment
control flow
image resolution