Login / Signup
An offensive containment strategy based on Malware's attack patterns.
Jonathan Pan
Chun Che Fung
Published in:
ICMLC (2013)
Keyphrases
</>
search strategy
data mining techniques
pattern mining
database systems
reverse engineering
interesting patterns
malware detection
team formation