Handling Anti-Virtual Machine Techniques in Malicious Software. Shi, H., Mirkovic, J., & Alwabel, A. ACM Transactions on Privacy and Security (TOPS), 21(1):2, ACM, 2018. bibtex @article{shi2018handling,
title={Handling Anti-Virtual Machine Techniques in Malicious Software},
author={Shi, Hao and Mirkovic, Jelena and Alwabel, Abdulla},
journal={ACM Transactions on Privacy and Security (TOPS)},
volume={21},
number={1},
pages={2},
year={2018},
publisher={ACM}
}
Downloads: 0
{"_id":"wja4384daMKvXh5qM","bibbaseid":"shi-mirkovic-alwabel-handlingantivirtualmachinetechniquesinmalicioussoftware-2018","author_short":["Shi, H.","Mirkovic, J.","Alwabel, A."],"bibdata":{"bibtype":"article","type":"article","title":"Handling Anti-Virtual Machine Techniques in Malicious Software","author":[{"propositions":[],"lastnames":["Shi"],"firstnames":["Hao"],"suffixes":[]},{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["Jelena"],"suffixes":[]},{"propositions":[],"lastnames":["Alwabel"],"firstnames":["Abdulla"],"suffixes":[]}],"journal":"ACM Transactions on Privacy and Security (TOPS)","volume":"21","number":"1","pages":"2","year":"2018","publisher":"ACM","bibtex":"@article{shi2018handling,\n title={Handling Anti-Virtual Machine Techniques in Malicious Software},\n author={Shi, Hao and Mirkovic, Jelena and Alwabel, Abdulla},\n journal={ACM Transactions on Privacy and Security (TOPS)},\n volume={21},\n number={1},\n pages={2},\n year={2018},\n publisher={ACM}\n}\n\n","author_short":["Shi, H.","Mirkovic, J.","Alwabel, A."],"key":"shi2018handling","id":"shi2018handling","bibbaseid":"shi-mirkovic-alwabel-handlingantivirtualmachinetechniquesinmalicioussoftware-2018","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["Lc8KDmQn8RuDaFqeg","nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["handling","anti","virtual","machine","techniques","malicious","software","shi","mirkovic","alwabel"],"title":"Handling Anti-Virtual Machine Techniques in Malicious Software","year":2018}