Sign in

Perturbation of Image-based Malware Detection with Smali level morphing techniques.

Federico GerardiGiacomo IadarolaFabio MartinelliAntonella SantoneFrancesco Mercaldo
Published in: ISPA/BDCloud/SocialCom/SustainCom (2021)
Keyphrases
  • malware detection
  • anomaly detection
  • malicious executables
  • databases
  • pattern recognition
  • source code
  • intrusion detection
  • operating system