Back to Search Start Over

Data mining methods for detection of new malicious executables.

Authors :
Schultz, M.G.
Eskin, E.
Zadok, F.
Stolfo, S.J.
Source :
Proceedings 2001 IEEE Symposium on Security & Privacy. S&P 2001; 2001, p38-49, 12p
Publication Year :
2001

Details

Language :
English
ISBNs :
9780769510460
Database :
Complementary Index
Journal :
Proceedings 2001 IEEE Symposium on Security & Privacy. S&P 2001
Publication Type :
Conference
Accession number :
81207170
Full Text :
https://doi.org/10.1109/SECPRI.2001.924286