·Paper Publications
Reverse Technique of Malicious Obfuscated Binary Code Based on Control Flow Graph
Release time:2024-06-23  Hits:
First Author: Fu,Cai
Correspondence Author: Fu,Cai
Co-author: Han,Lansheng,Fang,ZhiCun,Zhang,Kang
Journal: Computer, Information and Telecommunication Systems
Document Type: 会议
Page Number: 1-5
Key Words: Communities;Algorithm design and analysis;Time complexity;Arrays;Detection algorithms;Complex networks;Partitioning algorithms;network community;k-clique;union-find structure
Date of Publication: 4182-01-01