Login / Signup
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Jedidiah R. Crandall
Zhendong Su
Shyhtsun Felix Wu
Frederic T. Chong
Published in:
CCS (2005)
Keyphrases
</>
countermeasures
security flaws
computer viruses
network traffic
information security
database systems
expert systems
security issues
neural network
data mining
genetic algorithm
information systems
web services
face recognition
bayesian networks
security risks