Sign in

Malware Persistence and Obfuscation: An Analysis on Concealed Strategies.

Muhammad Usman RanaMunam Ali ShahOsama Ellahi
Published in: ICAC (2021)
Keyphrases
  • reverse engineering
  • static analysis
  • statistical analysis
  • data analysis
  • image analysis
  • business processes
  • dynamic analysis