Detecting malicious files using non-signature-based methods. Vinod, P., Laxmi, V., Gaur, M. S., & Chauhan, G. Int. J. Inf. Comput. Secur., 6(3):199–240, 2014.
Detecting malicious files using non-signature-based methods [link]Paper  doi  bibtex   
@article{DBLP:journals/ijics/VinodLGC14,
  author       = {P. Vinod and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Grijesh Chauhan},
  title        = {Detecting malicious files using non-signature-based methods},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {199--240},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066646},
  doi          = {10.1504/IJICS.2014.066646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0