Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Dec 22, 2015 · In this perspective, this paper aims to spot malware covertly exchanging data using two detection methods based on artificial intelligence tools ...
Jan 12, 2016 · In this perspective, the paper aims to spot malware covertly exchanging data by using two detection methods based on artificial intelligence ...
Dec 15, 2015 · Abstract—Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness.
Apr 1, 2016 · In this perspective, this paper aims to spot malware covertly exchanging data using two detection methods based on artificial intelligence tools ...
In this perspective, the paper aims to spot malware covertly exchanging data by using two detection methods based on artificial intelligence tools such as ...
Co-authors ; Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. L Caviglione, M Gaggero, JF ...
2016 Seeing the unseen: Revealing mobile malware hidden communications via energy consumption and artificial intelligence IEEE Trans. Inf. Forensics Secur ...
L. Caviglione et al. Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence. IEEE Trans.
et al. Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence. IEEE Transactions on Information ...