Return to Article Details Identification of Desirable Traits in Malicious Portable Executable Files Download Download PDF