![]() |
Volumn 5, Issue , 2008, Pages 160-164
|
A novel approach to malicious executables detection and containment based on distributed system architecture
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CLASSIFIERS;
COMPUTER CRIME;
DATA MINING;
INFORMATION MANAGEMENT;
LEARNING SYSTEMS;
AUDIT DATUMS;
AUTOMATED FASHIONS;
BEHAVIORAL FEATURES;
DATA MINING TECHNIQUES;
DISTRIBUTED SYSTEM ARCHITECTURES;
EXECUTABLES;
HIGH ACCURACIES;
HOST LEVELS;
LOW OVERHEADS;
MALICIOUS EXECUTABLES;
MALWARE;
MANUAL ANALYSIS;
OPTIMIZE EFFICIENCIES;
VIRTUALIZED ENVIRONMENTS;
COMPUTER VIRUSES;
|
EID: 57649195950
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICNC.2008.648 Document Type: Conference Paper |
Times cited : (1)
|
References (9)
|