Login / Signup
Detecting malicious files using non-signature-based methods.
P. Vinod
Vijay Laxmi
Manoj Singh Gaur
Grijesh Chauhan
Published in:
Int. J. Inf. Comput. Secur. (2014)
Keyphrases
</>
digital libraries
software engineering
anomaly detection
intrusion detection
information security
detecting malicious