Cited By
View all- Chysi ANikolopoulos SPolenakis I(2022)Detection and classification of malicious software utilizing Max-Flows between system-call groupsJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00433-219:1(97-123)Online publication date: 14-Jun-2022
- Nikolopoulos SPolenakis I(2022)Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphsJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00423-418:4(383-406)Online publication date: 15-Jun-2022
- Alaeiyan MParsa S(2022)A hierarchical layer of atomic behavior for malicious behaviors predictionJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00422-518:4(367-382)Online publication date: 7-Apr-2022
- Show More Cited By