Arnur, G. Tokhtabayev
(2016-06-13)
In the past years, malware developers continuously have been searching for yet new ways to attack hosts and evade existing popular cyber-defense systems, e.g. anti-viruses (AV) and intrusion detection systems (IDS). To ...