Stavrou, AngelosSmutz, Charles2017-01-292017-01-292016https://hdl.handle.net/1920/10618In order to exploit the large number of vulnerabilities offered by user169 pagesenCopyright 2016 Charles SmutzInformation technologyAdversarial learningContent randomizationMalwareMutual agreementRandom ForestsCountering Malicious Documents and Adversarial LearningDissertation