1

Clustering of Similar Malware Behavior via Structural Host-sequence Comparison

Malware (malicious software) is used by attackers to gain access to end-users' computing devices with the aim of performing malicious actions, such as sending spam, downloading malicious files, and stealing private information

Real-time Fast-flux Identification via Localized Spatial Geolocation Detection

Android Malware Detection via a Latent Network Behavior Analysis