Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis.
Alberto RedondoDavid Ríos InsuaPublished in: CoRR (2019)
Keyphrases
- risk analysis
- anti virus
- malicious code
- static analysis
- malware detection
- reverse engineering
- computer security
- detect malicious
- information security
- control flow
- unauthorized access
- detecting malicious
- risk assessment
- risk management
- network security
- dynamic analysis
- operating system
- risk factors
- access control
- attack scenarios
- decision making
- anomaly detection
- software engineering
- source code
- data flow
- influence diagrams
- object oriented
- fuzzy sets
- artificial intelligence
- open source
- critical infrastructure
- network traffic
- expert systems
- computational complexity
- intrusion detection