Login / Signup

Two steps to obfuscation.

Noah E. FriedkinEugene C. Johnsen
Published in: Soc. Networks (2014)
Keyphrases
  • information systems
  • reverse engineering
  • machine learning
  • data model
  • malware detection
  • database
  • data sets
  • learning algorithm
  • image processing
  • multi agent
  • data streams
  • static analysis