How to Automatically Identify the Homology of Different Malware
暂无分享,去创建一个
[1] Levente Buttyán,et al. The Cousins of Stuxnet: Duqu, Flame, and Gauss , 2012, Future Internet.
[2] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[3] Curtis R. Cook,et al. Programming style authorship analysis , 1989, CSC '89.
[4] Eric Chien,et al. W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.
[5] Arun Lakhotia,et al. Malware Analysis and attribution using Genetic Information , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[6] Md. Rafiqul Islam,et al. Differentiating malware from cleanware using behavioural analysis , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[7] Ali A. Ghorbani,et al. Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[8] Arun Lakhotia,et al. Identifying Shared Software Components to Support Malware Forensics , 2014, DIMVA.
[9] Lynn Margaret Batten,et al. Function length as a tool for malware classification , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[10] Levente Buttyán,et al. Duqu: A Stuxnet-like malware found in the wild , 2011 .
[11] Rob Sloan,et al. Advanced Persistent Threat , 2014 .
[12] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[13] Guanhua Yan,et al. Discriminant malware distance learning on structural information for automated malware classification , 2013, SIGMETRICS.