Application of Hidden Markov Model for classifying metamorphic virus
暂无分享,去创建一个
[1] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[2] Mark Stamp,et al. Opcode graph similarity and metamorphic detection , 2012, Journal in Computer Virology.
[3] Yuval Elovici,et al. Detecting unknown malicious code by applying classification techniques on OpCode patterns , 2012, Security Informatics.
[4] Caixin Sun,et al. The Dynamic Character Curve Adjusting Model of Electric Load Based on Data Mining Theory , 2005, ADMA.
[5] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[6] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[7] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[8] Zoubin Ghahramani,et al. An Introduction to Hidden Markov Models and Bayesian Networks , 2001, Int. J. Pattern Recognit. Artif. Intell..
[9] Jianping Yin,et al. Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code , 2005, FSKD.
[10] Arun K. Pujari,et al. N-gram analysis for computer virus detection , 2006, Journal in Computer Virology.
[11] Giovanni Vigna,et al. Using Hidden Markov Models to Evaluate the Risks of Intrusions , 2006, RAID.
[12] Curtis Hash,et al. Stochastic identification of malware with dynamic traces , 2014, 1404.2462.
[13] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[14] Dragos Gavrilut,et al. Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[15] Michael Collins,et al. Discriminative Training Methods for Hidden Markov Models: Theory and Experiments with Perceptron Algorithms , 2002, EMNLP.
[16] Eric Filiol,et al. Malware Pattern Scanning Schemes Secure Against Black-box Analysis , 2006, Journal in Computer Virology.