Call graph obfuscation and diversification: an approach.
Miguel Rodríguez-VelizYulier Nuñez-MusaRoberto Sepúlveda LimaPublished in: IET Inf. Secur. (2020)
Keyphrases
- graph theory
- random walk
- graph representation
- reverse engineering
- graph structure
- structured data
- graph matching
- data transformation
- graph mining
- directed acyclic graph
- link analysis
- bipartite graph
- data sets
- weighted graph
- tabu search
- directed graph
- graph model
- graph theoretic
- graph construction
- graph search
- spectral clustering
- graph structures
- graph based algorithm