Login / Signup
Malware detection inspired by the human immune system and making use of honeytokens.
John Cossu
Hala ElAarag
Published in:
SpringSim (CNS) (2015)
Keyphrases
</>
malware detection
anomaly detection
malicious executables
immune systems
application programming interface
artificial immune system
intrusion detection
machine learning
training set
information systems
database systems