Watch this video on YouTube
In the context of endpoint security, what is the main advantage of behavior-based analysis over signature-based detection?