Applications and the road ahead
Outline
Chapter 9. Applications of state-of-the-art malware modeling frameworks
Chapter 10. The road ahead
Chapter 11. Conclusions
18.223.209.118