no code implementations • 22 Oct 2021 • Marek Galovic, Branislav Bosansky, Viliam Lisy
In malware behavioral analysis, the list of accessed and created files very often indicates whether the examined file is malicious or benign.
Adversarial Attack