Login / Signup
Noisy defenses: subverting malware's OODA loop.
Daniel Bilar
Published in:
CSIIRW (2008)
Keyphrases
</>
noise free
network monitoring
reverse engineering
real time
network security
databases
noisy data
malware detection
data sets
genetic algorithm
missing data
static analysis
feedback loop
machine learning systems
complex event processing
detect malicious