Malware Detection using Structural and Behavioural Features and Machine Learning
暂无分享,去创建一个
[1] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[2] Steve R. White,et al. Computers and epidemiology , 1993, IEEE Spectrum.
[3] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[4] J. Fleiss. Statistical methods for rates and proportions , 1974 .
[5] J. Ross Quinlan,et al. Combining Instance-Based and Model-Based Learning , 1993, ICML.
[6] Johnson M. Hart,et al. Windows System Programming , 2004 .
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] George Cybenko,et al. Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..
[9] Jerome A. Feldman,et al. On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.
[10] Kyung-Suk Lhee,et al. Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..
[11] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[12] Antonia J. Jones,et al. Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences , 2007, Comput. Secur..
[13] Ronald L. Rivest,et al. Constructing Optimal Binary Decision Trees is NP-Complete , 1976, Inf. Process. Lett..
[14] Mingtian Zhou,et al. Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..
[15] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[16] J. Ross Quinlan,et al. Unknown Attribute Values in Induction , 1989, ML.
[17] Steve R. White,et al. Anatomy of a Commercial-Grade Immune System , 1999 .
[18] Joseph M. Newcomer,et al. Win32 programming , 1997 .
[19] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[20] Zhi-hong Zuo,et al. Infection, imitation and a hierarchy of computer viruses , 2006, Comput. Secur..
[21] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[22] R. Boudon,et al. The Unintended Consequences of Social Action , 1984 .
[23] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[24] A. Watkins. An immunological approach to intrusion detection , 2000 .
[25] Mark Russinovich,et al. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer) , 2004 .
[26] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[27] Carl S. Young,et al. Infection dynamics on the Internet , 2005, Comput. Secur..
[28] Gerald L. Kovacich,et al. Information Assurance: Surviving in the Information Environment , 2001 .
[29] Fred Cohen,et al. Computational aspects of computer viruses , 1989, Comput. Secur..
[30] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[31] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .
[32] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[33] Danny Bradbury. The metamorphosis of malware writers , 2006, Comput. Secur..
[34] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[35] J. B. Gunn. Use of virus functions to provide a virtual APL interpreter under user control , 1984 .
[36] Kurt Hornik,et al. Multilayer feedforward networks are universal approximators , 1989, Neural Networks.
[37] Eugene H. Spafford,et al. Active Defense of a Computer System using Autonomous Agents , 1995 .
[38] Matt Bishop,et al. An Overview of Computer Viruses in a Research Environment , 1991 .
[39] Brian W. Kernighan,et al. The C Programming Language, Second Edition , 1988 .
[40] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[41] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.