Mining control flow graph as \emphAPI call-grams to detect portable executable malware. Faruki, P., Laxmi, V., Gaur, M. S., & Vinod, P. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 130–137, 2012.
Mining control flow graph as \emphAPI call-grams to detect portable executable malware [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/sin/FarukiLGV12,
  author       = {Parvez Faruki and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  P. Vinod},
  title        = {Mining control flow graph as \emph{API call-grams} to detect portable
                  executable malware},
  booktitle    = {5th International Conference of Security of Information and Networks,
                  {SIN} '12, Jaipur, India, October 22 - 26, 2012},
  pages        = {130--137},
  year         = {2012},
  crossref     = {DBLP:conf/sin/2012},
  url          = {https://doi.org/10.1145/2388576.2388594},
  doi          = {10.1145/2388576.2388594},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/FarukiLGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0