Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.
Andrew ChiBlake AndersonMichael K. ReiterPublished in: ACSAC (2023)
Keyphrases
- control flow
- financial risk
- workflow management systems
- risk assessment
- reverse engineering
- risk management
- information management
- malware detection
- information systems
- risk factors
- network traffic
- data flow
- knowledge management
- decision making
- requirements engineering
- high risk
- risk analysis
- risk measures
- concurrent execution
- enterprise information systems
- malicious code
- neural network
- execution model
- static analysis
- enterprise systems
- enterprise architecture
- data sets
- process model
- mobile agents
- case study