BOOK-CHAPTER

Malware Obfuscator for Malicious Executables

Sachin Jain

Year: 2012 Communications in computer and information science Pages: 461-469   Publisher: Springer Science+Business Media
Keywords:
Malware Obfuscation Computer science Cryptovirology Executable Signature (topology) Code (set theory) System call Computer security Operating system Programming language Set (abstract data type)

Metrics

3
Cited By
1.31
FWCI (Field Weighted Citation Impact)
1
Refs
0.78
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Malicious Executables

Auerbach Publications eBooks Year: 2011 Pages: 111-118
JOURNAL ARTICLE

Detection of Malware and Malicious Executables Using E-Birch Algorithm

Ashit

Journal:   International Journal of Advanced Computer Science and Applications Year: 2016 Vol: 7 (1)
JOURNAL ARTICLE

Supervisory Control of Malicious Executables †

Vir V. PhohaXin XuAsok RayShashi Phoha

Journal:   IFAC Proceedings Volumes Year: 2003 Vol: 36 (5)Pages: 1065-1070
BOOK-CHAPTER

Learning to Detect Malicious Executables

J. Zico KolterMarcus A. Maloof

Advanced information and knowledge processing Year: 2006 Pages: 47-63
© 2026 ScienceGate Book Chapters — All rights reserved.