Login / Signup

Detecting malicious files using non-signature-based methods.

P. VinodVijay LaxmiManoj Singh GaurGrijesh Chauhan
Published in: Int. J. Inf. Comput. Secur. (2014)
Keyphrases
  • digital libraries
  • software engineering
  • anomaly detection
  • intrusion detection
  • information security
  • detecting malicious