×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [metamorphic code]
Protecting endpoints from targeted attacks
141 views
HUNTING FOR METAMORPHIC ENGINES
24 views
Effective and efficient malware detection at the end host
29 views
EFFECTIVE AND EFFICIENT MALWARE DETECTION AT THE END HOST Presentation by Clark Wachsmuth C. Kolbitsch, P. M. Comparetti, C. Kreugel, E. Kirda, X. Zhou
216 views
Effective and efficient malware detection at the end host
36 views