Malicious application detection method and device and storage medium
A malicious application and detection method technology, applied in the computer field, can solve problems such as low detection efficiency, large resource consumption, and large consumption of computing and storage resources, and achieve the effects of improving accuracy, improving detection efficiency, and saving computing and storage resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] In order to make the purpose, technical solution and advantages of the present application clearer, the following will describe the embodiments of the present application in conjunction with the accompanying drawings in the embodiments of the present application.
[0076] The terms "first" and "second" in the specification, claims and drawings of the present application are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units that are not listed, or optionally It also includes other steps or units inherent to these processes, methods, products, or devices.
[0077] Reference herein to "an embodiment" means that a particular ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


