What is it about?
The article is about building the most discriminating behavioral model for detecting malware.
Featured Image
Read the Original
This page is a summary of: Mining malicious behavioural patterns, IET Information Security, January 2018, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-ifs.2017.0079.
You can read the full text:
Contributors
The following have contributed to this page