@dblp

Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract).

, und . DIMVA, Volume 8550 von Lecture Notes in Computer Science, Seite 41-50. Springer, (2014)

Links und Ressourcen

Tags