Login / Signup
Malicious Code Detection Using Opcode Running Tree Representation.
Yuxin Ding
Wei Dai
Yibin Zhang
Chenglong Xue
Published in:
3PGCIC (2014)
Keyphrases
</>
tree representation
malicious code detection
tree structure
binary tree
tree structures
false positives and false negatives
data mining techniques
pruning algorithm
telecommunication systems
real time
stream data mining
data structure
search algorithm
data model