Author:
Pan Zhixin,Mishra Prabhat
Publisher
Springer Nature Switzerland
Reference31 articles.
1. Malware Obfuscation Techniques: A Brief Survey. IEEE Computer Society, 2010.
2. Kishore Angrishi. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV). CoRR, 2017.
3. Daniel Arp et al. Effective and efficient malware detection at the end host. In 18th USENIX, Montreal, Quebec, 2009.
4. Kanad Basu et al. PREEMPT: preempting malware by examining embedded processor traces. In DAC, page 166, 2019.
5. Zahra Bazrafshan et al. A survey on heuristic malware detection techniques. In ICIKF, pages 113–120, 2013.