Skip to main content

Table 2 Optimum features for malware detection at selected run lengths (K-opcodes)

From: Detecting obfuscated malware using reduced opcode set and optimised runtime trace