Login / Signup
Computing the behavior of malicious code with function extraction technology.
Richard C. Linger
Stacy J. Prowell
Kirk Sayre
Published in:
CSIIRW (2009)
Keyphrases
</>
malicious code
static analysis
malicious behavior
cost effective
information extraction
automatic extraction
case study
data processing
personal computer
rapid development
artificial intelligence
real world
object recognition
computer systems
data sets
network traffic
behavior patterns