Darwin inside the machines: Malware evolution and the consequences for computer security
Dimitris IliopoulosChristoph AdamiPeter SzorPublished in: CoRR (2011)
Keyphrases
- computer security
- artificial life
- anti virus
- anomaly detection
- computer systems
- information security
- intrusion detection
- network intrusion detection
- network security
- intrusion detection system
- metadata
- data sets
- smart card
- pattern recognition
- data processing
- reverse engineering
- law enforcement
- decision making
- artificial intelligence
- malware detection
- data mining