Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files
暂无分享,去创建一个
Norio Shiratori | Hisaaki Yamaba | Naonobu Okazaki | Shotaro Usuzaki | Kentaro Aburada | Tetsuro Katayama | Mirang Park | Ryusei Fuji
[1] Ross King,et al. Neural network and blockchain based technique for cyber threat intelligence and situational awareness , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[2] Yanfang Ye,et al. Malicious sequential pattern mining for automatic malware detection , 2016, Expert Syst. Appl..
[3] Arthur Gervais,et al. Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[4] Ali Hamzeh,et al. A survey on heuristic malware detection techniques , 2013, The 5th Conference on Information and Knowledge Technology.
[5] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[6] Xiaojiang Du,et al. Consortium Blockchain-Based Malware Detection in Mobile Devices , 2018, IEEE Access.