M Ramilli,
M Bishop - 2010 5th International Conference on …, 2010 - ieeexplore.ieee.org
Malware signature detectors use patterns of bytes, or variations of patterns of bytes, to detect
malware attempting to enter a systems. This approach assumes the signatures are both or …