Login / Signup

The Rise of ICS Malware: A Comparative Analysis.

Yassine MekdadGiuseppe BernieriMauro ContiAbdeslam El Fergougui
Published in: CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS (2021)
Keyphrases
  • malware detection
  • reverse engineering
  • malicious code
  • detect malicious
  • database
  • data sets
  • decision making
  • static analysis
  • case study
  • information technology
  • high demand