A graph theoretic approach to malware detection

Full text