Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)

Cite

Text

Fairbanks et al. "Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)." AAAI Conference on Artificial Intelligence, 2022. doi:10.1609/AAAI.V36I11.21607

Markdown

[Fairbanks et al. "Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)." AAAI Conference on Artificial Intelligence, 2022.](https://mlanthology.org/aaai/2022/fairbanks2022aaai-identifying/) doi:10.1609/AAAI.V36I11.21607

BibTeX

@inproceedings{fairbanks2022aaai-identifying,
  title     = {{Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)}},
  author    = {Fairbanks, Jeffrey and Orbe, Andres and Patterson, Christine and Serra, Edoardo and Scheepers, Marion},
  booktitle = {AAAI Conference on Artificial Intelligence},
  year      = {2022},
  pages     = {12941-12942},
  doi       = {10.1609/AAAI.V36I11.21607},
  url       = {https://mlanthology.org/aaai/2022/fairbanks2022aaai-identifying/}
}