Login / Signup
Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity.
Jihun Kim
Jonghee M. Youn
Published in:
MUE/FutureTech (2017)
Keyphrases
</>
detection method
dynamic analysis
malicious behavior
static analysis
reverse engineering
malicious code
face detection
detection algorithm
anti virus
region detection
model checking
database
database systems
databases
metadata
intrusion detection
source code
software engineering
object oriented
query language