Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 1 publication
(2 reference statements)
0
2
0
Order By: Relevance
“…Nonetheless, malwares can easily hide from such monitoring by running their code inside the body of other benign processes. Law et al [21] decides whether a machine is compromised or not after correlating and analyzing its collected network and memory events.…”
Section: Related Workmentioning
confidence: 99%
“…Based on these analyses, some approaches determine whether it is bot host through statistical anomaly, artificial immune systems, or correlation algorithms [4][5][6][7]. (4) Discover bot host through monitoring network connection and memory status, by manual processing and network tools [8]. (5) Use traditional host antivirus software.…”
Section: Introductionmentioning
confidence: 99%