Integrated Static and Dynamic Analysis for Malware Detection
暂无分享,去创建一个
[1] Aman Jantan,et al. Malware Behavior Analysis: Learning and Understanding Current Malware Threats , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.
[2] Mark Stamp,et al. Deriving common malware behavior through graph clustering , 2013, Comput. Secur..
[3] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[4] Wen Fu,et al. Malware Detection Based on Suspicious Behavior Identification , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[5] Ohm Sornil,et al. Classification of malware families based on N-grams sequential pattern features , 2013, 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA).
[6] Mansour Ahmadi,et al. Malware detection by behavioural sequential patterns , 2013 .
[7] Md. Rafiqul Islam,et al. Classification of malware based on integrated static and dynamic features , 2013, J. Netw. Comput. Appl..
[8] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[9] Alva Erwin,et al. Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[10] M. Ghiasi,et al. A miner for malware detection based on API function calls and their arguments , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).
[11] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[12] Ki Wook Sohn,et al. Toward extracting malware features for classification using static and dynamic analysis , 2012, 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC).
[13] Lynn Batten,et al. Classification of Malware Based on String and Function Feature Selection , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.
[14] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.