Login / Signup

Analyzing and Exploiting Network Behaviors of Malware.

Jose Andre MoralesAreej Al-BatainehShouhuai XuRavi S. Sandhu
Published in: SecureComm (2010)
Keyphrases
  • network structure
  • network model
  • peer to peer
  • reverse engineering
  • complex networks
  • neural network
  • learning algorithm
  • cooperative
  • digital libraries
  • distributed network