Login / Signup

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.

Arwa Abdulkarim Al AlsadiKaichi SameshimaKatsunari YoshiokaMichel van EetenCarlos Hernandez Gañán
Published in: RAID (2023)
Keyphrases
  • management system
  • case study
  • reverse engineering
  • neural network
  • learning algorithm
  • information security
  • target object