Using spatio-temporal information in API calls with machine learning algorithms for malware detection
暂无分享,去创建一个
Muhammad Zubair Shafiq | Muddassar Farooq | Faraz Ahmed | Haider Hameed | M. Shafiq | M. Farooq | F. Ahmed | Haider Hameed
[1] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[2] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[4] R. Sekar,et al. A practical mimicry attack against powerful system-call monitors , 2008, ASIACCS '08.
[5] Muhammad Zubair Shafiq,et al. Embedded Malware Detection Using Markov n-Grams , 2008, DIMVA.
[6] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Ian Witten,et al. Data Mining , 2000 .
[8] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[9] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[10] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Salvatore J. Stolfo,et al. Learning Rules from System Call Arguments and Sequences for Anomaly 20 Detection , 2003 .
[13] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).