@dblp

POSTER: Identifying Dynamic Data Structures in Malware.

, , , , , and . ACM Conference on Computer and Communications Security, page 1772-1774. ACM, (2016)

Links and resources

Tags