Cited By
View all- Alrabaee SDebbabi MWang L(2022)A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and FeaturesACM Computing Surveys10.1145/348686055:1(1-41)Online publication date: 17-Jan-2022
- Narouei MAhmadi MGiacinto GTakabi HSami A(2015)DLLMinerSecurity and Communication Networks10.1002/sec.12558:18(3311-3322)Online publication date: 1-Dec-2015
- Komashinskiy DKotenko I(2012)Using low-level dynamic attributes for malware detection based on data mining methodsProceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security10.1007/978-3-642-33704-8_22(254-269)Online publication date: 17-Oct-2012
