Login / Signup

Computing the behavior of malicious code with function extraction technology.

Richard C. LingerStacy J. ProwellKirk Sayre
Published in: CSIIRW (2009)
Keyphrases