Login / Signup
On The Vulnerability of Anti-Malware Solutions to DNS Attacks.
Asaf Nadler
Ron Bitton
Oleg Brodt
Asaf Shabtai
Published in:
CoRR (2021)
Keyphrases
</>
operating system
buffer overflow
detect malicious
countermeasures
optimal solution
malicious code
security vulnerabilities
security risks
solution quality
detecting malicious
reverse engineering
data mining
benchmark problems
digital images
multi objective
evolutionary algorithm
genetic algorithm