"Shadow attacks: automatically evading system-call-behavior based malware ..."

Weiqin Ma et al. (2012)

Details and statistics

DOI: 10.1007/S11416-011-0157-5

access: closed

type: Journal Article

metadata version: 2020-05-17

a service of  Schloss Dagstuhl - Leibniz Center for Informatics