Inproceedings,

Identifying Dormant Functionality in Malware Programs.

, , , , , and .
IEEE Symposium on Security and Privacy, page 61-76. IEEE Computer Society, (2010)

Meta data

Tags

Users

  • @dblp

Comments and Reviews