An Accurate Packer Identification Method Using Support Vector Machine
暂无分享,去创建一个
Shanqing Guo | Tao Ban | Koji Nakao | Ryoichi Isawa | Daisuke Inoue | Shanqing Guo | Tao Ban | D. Inoue | K. Nakao | Ryoichi Isawa
[1] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[2] Wenke Lee,et al. Classification of packed executables for accurate computer virus detection , 2008, Pattern Recognit. Lett..
[3] Robert Lyda,et al. Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.
[4] Thomas M. Cover,et al. Geometrical and Statistical Properties of Systems of Linear Inequalities with Applications in Pattern Recognition , 1965, IEEE Trans. Electron. Comput..
[5] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .
[6] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[7] Gérard Dreyfus,et al. Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.
[8] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[9] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[10] Georg Wicherski,et al. peHash: A Novel Approach to Fast Malware Clustering , 2009, LEET.
[11] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[12] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[13] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[14] Alexander J. Smola,et al. Learning with Kernels: support vector machines, regularization, optimization, and beyond , 2001, Adaptive computation and machine learning series.
[15] Li Sun,et al. Pattern Recognition Techniques for the Classification of Malware Packers , 2010, ACISP.
[16] Andrew Honig,et al. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012 .
[17] Christopher Krügel,et al. A Static, Packer-Agnostic Filter to Detect Similar Malware Samples , 2012, DIMVA.
[18] Oguz Findik,et al. Effects of principle component analysis on assessment of coronary artery diseases using support vector machine , 2010, Expert Syst. Appl..
[19] Tzi-cker Chiueh,et al. A Study of the Packer Problem and Its Solutions , 2008, RAID.