暂无分享,去创建一个
[1] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[2] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[3] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[4] Ratan K. Guha,et al. Detecting Obfuscated Viruses Using Cosine Similarity Analysis , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).
[5] Guillaume Bonfante,et al. Control Flow Graphs as Malware Signatures , 2007 .
[6] Shih-Fu Chang,et al. Integrated spatial and feature image query , 1999, Multimedia Systems.
[7] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[8] Grant Malcolm,et al. Detection of metamorphic computer viruses using algebraic specification , 2006, Journal in Computer Virology.
[9] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[10] Belal Zaqaibeh,et al. Computer Virus Strategies and Detection Methods , 2008 .
[11] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[12] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.