暂无分享,去创建一个
[1] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[2] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[3] H LINHARES. [History of viruses]. , 1951, Imprensa medica.
[4] L. M. Adleman,et al. An abstract theory of computer viruses (invited talk) , 1990, CRYPTO 1990.
[5] Eric Filiol,et al. Evaluation methodology and theoretical model for antiviral behavioural detection strategies , 2007, Journal in Computer Virology.
[6] Éric Filiol. Computer Viruses: from Theory to Applications , 2005 .
[7] Micah Sherr,et al. Proceedings of the 29th Annual Computer Security Applications Conference , 2013, ACSAC 2013.
[8] Jau-Hwang Wang,et al. Virus detection using data mining techinques , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[9] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[10] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[11] Karl N. Levitt,et al. MCF: a malicious code filter , 1995, Comput. Secur..
[12] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[13] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Sattar Hashemi,et al. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis , 2008, Expert Syst. J. Knowl. Eng..
[15] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[16] Tao Li,et al. An intelligent PE-malware detection system based on association mining , 2008, Journal in Computer Virology.
[17] Jesse C. Rabek,et al. Detection of injected, dynamically generated, and obfuscated malicious code , 2003, WORM '03.
[18] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.