Optimal Feature Selection for Non-Network Malware Classification
暂无分享,去创建一个
Ritwik Murali | KannanMani S ManiArasuSekar | Paveethran Swaminathan | Ratan Govind K | Siva Surya V
[1] Karthik Raman,et al. Selecting Features to Classify Malware , 2012 .
[2] Jianhui Lin. On Malicious Software Classification , 2008, 2008 International Symposium on Intelligent Information Technology Application Workshops.
[3] Yuval Elovici,et al. Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[4] Paul A. Watters,et al. RBACS: Rootkit Behavioral Analysis and Classification System , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.
[5] Marius Kloft,et al. Early detection of malicious behavior in JavaScript code , 2012, AISec '12.
[6] Seyed Vahid Azhari,et al. Host Hypervisor Trace Mining for Virtual Machine Workload Characterization , 2019, 2019 IEEE International Conference on Cloud Engineering (IC2E).
[7] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[8] Md. Rafiqul Islam,et al. An automated classification system based on the strings of trojan and virus families , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[9] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[10] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Anjana V. Kumar,et al. Split personality malware detection and defeating in popular virtual machines , 2012, SIN '12.
[12] Kun Wang,et al. A Risk Assessment Method based on Software Behavior , 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI).
[13] Lior Rokach,et al. Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..
[14] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[15] Lynn Margaret Batten,et al. Function length as a tool for malware classification , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[16] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[17] Radu State,et al. Malware behaviour analysis , 2008, Journal in Computer Virology.
[18] Douglas S. Reeves,et al. Fast malware classification by automated behavioral graph matching , 2010, CSIIRW '10.
[19] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[20] Muhammad Zubair Shafiq,et al. Using spatio-temporal information in API calls with machine learning algorithms for malware detection , 2009, AISec '09.
[21] Jie He,et al. Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[22] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[23] Vlado Keselj,et al. N-gram-based detection of new malicious code , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[24] Salvatore J. Stolfo,et al. Towards Stealthy Malware Detection , 2007, Malware Detection.
[25] M. Ritwik,et al. Analyzing the Makier Virus , 2013 .
[26] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[27] Jiawei Han,et al. Mining Multiple-Level Association Rules in Large Databases , 1999, IEEE Trans. Knowl. Data Eng..
[28] Jiawei Han,et al. Frequent pattern mining: current status and future directions , 2007, Data Mining and Knowledge Discovery.
[29] T. Gireesh Kumar,et al. Static and Dynamic Analysis for Android Malware Detection , 2018, CloudCom 2018.