Skip to content
  • Overview
  • Team
  • Capabilities
  • Projects
  • Blog
  • Demos
  • Presentations
  • Publications
  • Sophos.com

Malware Data Science: Attack Detection and Attribution

Richard Harang
Hillary Sanders
Attribution PE Malware
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Post navigation

Previous: De-anonymizing programmers via code stylometry
Next: Garbage in, garbage out: how purportedly great ML models can be screwed up by bad data
Sophos AI - Smarter Security
Follow Us
  • Facebook
  • Instagram
  • LinkedIn
  • RSS
  • Twitter
  • YouTube
  • Legal
  • Privacy
  • Cookies
© 1997–2022 Sophos Ltd. All rights reserved.