Login / Signup
Graph-Based Comparison of IoT and Android Malware.
Hisham Alasmary
Afsah Anwar
Jeman Park
Jinchun Choi
DaeHun Nyang
Aziz Mohaisen
Published in:
CSoNet (2018)
Keyphrases
</>
malware detection
management system
graph model
semi supervised
reverse engineering
statistical analysis
databases
neural network
mobile devices
data processing
cloud computing
anomaly detection
intrusion detection