A graph-based model for malicious code detection exploiting dependencies of system-call groups
2015 ◽
Vol 8
(17)
◽
pp. 3238-3246
◽