Login / Signup
Malware Task Identification: A Data Driven Approach.
Eric Nunes
Casey Buto
Paulo Shakarian
Christian Lebiere
Stefano Bennati
Robert Thomson
Holger Jaenisch
Published in:
ASONAM (2015)
Keyphrases
</>
data driven
reverse engineering
automatic identification
data sets
artificial intelligence
case study
three dimensional
face recognition
search algorithm
control flow
malware detection
person identification