What is it about?

The article is about building the most discriminating behavioral model for detecting malware.

Featured Image

Read the Original

This page is a summary of: Mining malicious behavioural patterns, IET Information Security, January 2018, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-ifs.2017.0079.
You can read the full text:

Read

Contributors

The following have contributed to this page