Login / Signup

Malware Task Identification: A Data Driven Approach.

Eric NunesCasey ButoPaulo ShakarianChristian LebiereStefano BennatiRobert ThomsonHolger Jaenisch
Published in: ASONAM (2015)
Keyphrases
  • data driven
  • reverse engineering
  • automatic identification
  • data sets
  • artificial intelligence
  • case study
  • three dimensional
  • face recognition
  • search algorithm
  • control flow
  • malware detection
  • person identification