Keywords:
Executable Computer science Computer security Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.07
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Malicious Executables

Auerbach Publications eBooks Year: 2011 Pages: 111-118
BOOK-CHAPTER

Data Mining for Detecting Malicious Executables

Auerbach Publications eBooks Year: 2011 Pages: 109-110
JOURNAL ARTICLE

Supervisory Control of Malicious Executables †

Vir V. PhohaXin XuAsok RayShashi Phoha

Journal:   IFAC Proceedings Volumes Year: 2003 Vol: 36 (5)Pages: 1065-1070
BOOK-CHAPTER

Learning to Detect Malicious Executables

J. Zico KolterMarcus A. Maloof

Advanced information and knowledge processing Year: 2006 Pages: 47-63
© 2026 ScienceGate Book Chapters — All rights reserved.