|
Volumn 5, Issue 2, 2007, Pages 40-45
|
Using entropy analysis to find encrypted and packed malware
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BINARY FILE BYTES;
BINTROPY;
MALWARE COLLECTIONS;
PACKED MALWARE;
BINARY SEQUENCES;
PROGRAM DEBUGGING;
RANDOM PROCESSES;
SOFTWARE ENGINEERING;
STATISTICAL METHODS;
PUBLIC KEY CRYPTOGRAPHY;
|
EID: 34047129159
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2007.48 Document Type: Review |
Times cited : (310)
|
References (5)
|