TY - JOUR AU - Bustos-Tabernero, Álvaro AU - López Sánchez, Daniel AU - González Arrieta, María Angélica AU - Novais, Paulo PY - 2024 SN - 1367-0751 SN - 1368-9894 UR - http://hdl.handle.net/10366/163133 AB - [EN]Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors... LA - eng PB - Oxford University Press KW - Cybersecurity KW - Threat intelligence KW - Deep learning KW - Graph neural network KW - Infostealer TI - Study of infostealers using Graph Neural Networks DO - 10.1093/jigpal/jzae105 T2 - Logic Journal of the IGPL ER -