Sign in

A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions.

Ethan M. RuddAndras RozsaManuel GüntherTerrance E. Boult
Published in: IEEE Commun. Surv. Tutorials (2017)
Keyphrases
  • open world
  • closed world
  • cooperative
  • incomplete information
  • detect malicious
  • data sets
  • malicious code
  • detecting malicious
  • data exchange
  • static analysis