Login / Signup
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming
Zhi Xin
Pengwei Lan
Dinghao Wu
Peng Liu
Bing Mao
Published in:
ACNS (2015)
Keyphrases
</>
detect malicious
control flow
malicious code
detecting malicious
high level
automatically generated
watermarking scheme
traffic analysis
delay insensitive
search engine
database systems
data flow
watermarking technique
data sets
attack detection
malicious users
attack scenarios
data mining