Cited By
View all- Linger RProwell SSayre K(2009)Computing the behavior of malicious code with function extraction technologyProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558648(1-2)Online publication date: 13-Apr-2009