A Method for Windows Malware Detection Based on Deep Learning
暂无分享,去创建一个
Li Ma | Xiang Huang | Yong Zhong | Wenyin Yang | Yong Zhong | Xiang Huang | Wenyin Yang | Li Ma
[1] Mark Stamp,et al. A comparison of static, dynamic, and hybrid analysis for malware detection , 2015, Journal of Computer Virology and Hacking Techniques.
[2] Meikang Qiu,et al. Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things , 2021, IEEE Transactions on Industrial Informatics.
[3] Joohan Lee,et al. Detecting Trojans Using Data Mining Techniques , 2008, IMTIC.
[4] Zhihui Lu,et al. Selective encryption on ECG data in body sensor network based on supervised machine learning , 2020, Inf. Fusion.
[5] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[6] Jingfeng Xue,et al. Malware Visualization for Fine-Grained Classification , 2018, IEEE Access.
[7] Meikang Qiu,et al. A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.
[8] Mamoun Alazab,et al. Towards Understanding Malware Behaviour by the Extraction of API Calls , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.
[9] Claudio Carpineto,et al. A Survey of Automatic Query Expansion in Information Retrieval , 2012, CSUR.
[10] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[11] S. Sitharama Iyengar,et al. A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..
[12] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[13] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[14] Zhu-xi Zhang. Research and implementation of trace capture technique-based on aspect-oriented programming: Research and implementation of trace capture technique-based on aspect-oriented programming , 2008 .
[15] Rui Li,et al. A Behavior-Based Approach for Malware Detection , 2017, IFIP Int. Conf. Digital Forensics.
[16] Wei Huang,et al. A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine , 2017 .
[17] Jon Barker,et al. Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.
[18] Mohd Aizaini Maarof,et al. Malware behavior image for malware variant identification , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[19] Yang Wang,et al. Malware Classification with Deep Convolutional Neural Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[20] Chandrasekar Ravi,et al. Malware Detection using Windows Api Sequence and Machine Learning , 2012 .
[21] Robert Lyda,et al. Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.
[22] S. Sitharama Iyengar,et al. Data-Driven Techniques in Disaster Information Management , 2017, ACM Comput. Surv..