Sign in

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.

Ahmed AbusnainaHisham AlasmaryMohammed AbuhamadSaeed SalemDaeHun NyangAziz Mohaisen
Published in: CSoNet (2019)
Keyphrases
  • malware detection
  • management system
  • computer systems
  • multi agent
  • graph mining
  • pattern recognition
  • semi supervised