Mining malicious behavioural patterns

Seifi, H; Parsa, S

Parsa, S (reprint author), Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran.

IET INFORMATION SECURITY, 2018; 12 (1): 60

Abstract

Most malware producers bypass signature-based detections through obfuscation techniques. Therefore, in order to provide proactive and real-time protec......

Full Text Link