stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Key-whan ChungPhuong CaoZbigniew T. KalbarczykRavishankar K. IyerPublished in: CSR (2023)
Keyphrases
- data driven
- data sets
- training data
- high quality
- data analysis
- original data
- raw data
- complex data
- application domains
- data points
- input data
- data collection
- synthetic data
- statistical methods
- spatial data
- statistical analysis
- knowledge discovery
- data sources
- data quality
- reverse engineering
- computer systems
- data acquisition
- data mining algorithms
- domain experts
- data processing
- end users
- databases