Identification of malware activities with rules | IEEE Conference Publication | IEEE Xplore