"Automatically Identifying Trigger-based Behavior in Malware."

David Brumley et al. (2008)

Details and statistics

DOI: 10.1007/978-0-387-68768-1_4

access: closed

type: Part in Book or Collection

metadata version: 2022-12-17

a service of  Schloss Dagstuhl - Leibniz Center for Informatics