A malicious program identification method and electronic device
A malicious program and identification method technology, applied in the computer field, can solve problems such as accurate identification of malicious programs, and achieve high recognition efficiency and high recognition accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The present invention is described below based on examples, but the present invention is not limited to these examples. In the following detailed description of the invention, some specific details are set forth in detail. The present application can be fully understood by those skilled in the art without the description of these detailed parts. In addition, those of ordinary skill in the art should understand that the drawings provided herein are for illustration purposes only.
[0033] Unless the context clearly requires, throughout the specification and claims, "comprises", "comprises" and similar words should be interpreted in an inclusive sense rather than an exclusive or exhaustive meaning; that is, "including but not limited to" meaning.
[0034] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative impor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


