Login / Signup
Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up?
David Dittrich
Published in:
login Usenix Mag. (2009)
Keyphrases
</>
malware detection
reverse engineering
malicious code
detect malicious
control flow
case study
static analysis
decision making
data model
dynamic analysis
computer systems
wireless sensor networks
database
digital libraries
computational complexity
high level
computer vision
learning algorithm
information retrieval