Login / Signup
Detecting Malicious Code by Exploiting Dependencies of System-call Groups.
Stavros D. Nikolopoulos
Iosif Polenakis
Published in:
CoRR (2014)
Keyphrases
</>
detecting malicious
detect malicious
source code
information systems