Noisy defenses: Subverting malware's OODA loop

D Bilar - Proceedings of the 4th annual workshop on Cyber …, 2008 - dl.acm.org
Proceedings of the 4th annual workshop on Cyber security and information …, 2008dl.acm.org
The question is how to deal in practice with complex evolved malicious software (malware).
In light of recent empirical and theoretical findings, we propose moving beyond techniques
premised on Turing Machine models towards iterative games and black-box process
modeling within an interactive computational framework.
The question is how to deal in practice with complex evolved malicious software (malware). In light of recent empirical and theoretical findings, we propose moving beyond techniques premised on Turing Machine models towards iterative games and black-box process modeling within an interactive computational framework.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果