Author:
Afonso Vitor M.,Filho Dario S. Fernandes,Gregio Andre R. A.,de Geus Paulo L.,Jino Mario
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Usage Patterns and Implementation of Machine Learning for Malware Detection and Predictive Evaluation;2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS);2022-02-23
2. The other guys: automated analysis of marginalized malware;Journal of Computer Virology and Hacking Techniques;2017-02-27
3. An ontology of suspicious software behavior;Applied Ontology;2016-03-22
4. SpotMal;Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists - SAICSIT '15;2015
5. Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior;Computational Science and Its Applications – ICCSA 2012;2012