Login / Signup

A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.

Anna MpantiStavros D. NikolopoulosIosif Polenakis
Published in: CompSysTech (2018)
Keyphrases