Automatic malware analysis. An emulator based approach.
DOI10.1007/978-1-4614-5523-3zbMATH Open1252.68030OpenAlexW2505418096MaRDI QIDQ3166388FDOQ3166388
Publication date: 12 October 2012
Published in: SpringerBriefs in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-1-4614-5523-3
Recommendations
- Recognizing malicious software behaviors with tree automata inference
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- A new malware classification approach based on malware dynamic analysis
- An improved method to unveil malware's hidden behavior
- Malware detection using machine learning
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60)
Cited In (2)
This page was built for publication: Automatic malware analysis. An emulator based approach.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3166388)