Malware-infected device identifications
Abstract:
In some examples, for a device that transmitted domain names, a system determines a dissimilarity between the domain names, compares a value derived from the determined dissimilarity to a threshold, and identifies the device as malware infected in response to the comparing.
Public/Granted literature
Information query
Patent Agency Ranking
0/0