@dblp

Detecting malicious files using non-signature-based methods.

, , , and . Int. J. Inf. Comput. Secur., 6 (3): 199-240 (2014)

Links and resources

Tags