Malicious code forensics based on data mining.
Xiaohua LiXiaomei DongYulong WangPublished in: FSKD (2013)
Keyphrases
- data mining
- malicious code
- static analysis
- data mining techniques
- data mining applications
- knowledge discovery
- reverse engineering
- data analysis
- data mining methods
- text mining
- network traffic
- intrusion detection
- rough sets
- association rule mining
- web intelligence
- web mining
- data mining algorithms
- object oriented
- association rules
- database
- law enforcement
- knowledge discovery in databases
- malicious behavior
- business intelligence
- open source
- relational databases
- reinforcement learning
- database systems