next up previous
Up: Data Mining Methods for Previous: Bibliography

About this document ...

Data Mining Methods for Detection of New Malicious Executables

This document was generated using the LaTeX2HTML translator Version 98.1p1 release (March 2nd, 1998)

Copyright © 1993, 1994, 1995, 1996, 1997, Nikos Drakos, Computer Based Learning Unit, University of Leeds.

The command line arguments were:
latex2html -show_section_numbers -split +1 -dir /home/ezk/html/research/binaryeval ieeesp01.tex.

The translation was initiated by Erez Zadok on 2001-05-19

Erez Zadok