Malware behavioral analysis system: TWMAN
Hsien-De Huang Chang-Shing Lee 1 Hung-Yu Kao 2 Yi-Lang Tsai 3 Jee-Gong Chang 4
2011 | CONFERENCE DOI:  10.1109/IA.2011.5953604
Computer security, Operating system, Computer science
Citation
30 / 35
Ind. / Total
Reference
9
Citations by Year
Citations
Last Updated: August 15, 2024
Cited By (21)
References (9)
Yi-Lang Tsai 1 Bo-Yi Lee 2 Jee-Gong Chang 3
2012 CONFERENCE DOI 10.1109/ICPADS.2012.114
Computer security, World Wide Web, Computer science
Citation
0
Mihai Cimpoesu 1 Claudiu Popa 2
2012 JOURNAL DOI 10.1007/S11416-012-0170-3
Operating system, Embedded system, Computer science
Citation
0
Saket Kumar 1 Chandra Bhim Bhan Singh 2
2018 CONFERENCE DOI 10.1109/ICICCT.2018.8473321
Computer security, Computer science
Citation
0
Chinyang Henry Tseng 1 Shiahuey Wang 2 Sheng-Chao Wang 3 Tong-Ying Juang 4
2014 CONFERENCE DOI 10.1109/INFOSEEE.2014.6946241
Computer security, Computer science
Citation
0
Najla Etaher 1 George R. S. Weir 2
2014 OTHER
Computer security, Internet privacy, Engineering
Citation
0
Want to explore more research activities?
See how Impactio can help you with your research career.
Start