Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures are achieved by malicious code or malware, such as viruses and worms. This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes...