A Frequency Approach to Creation of Executable File Signatures for their Identification
暂无分享,去创建一个
Ilya Lebedev | Nurzhan Bazhayev | Sergey Pecherkin | Kseniya Salakhutdinova | Mikhail Sukhoparov | Irina Krivtsova | Pavel Smimov | Dmitry Markelov | Alexander Davvdov | Dmitry Kolcherin | Yuriy Shaparenko | Yuriy Iskanderov
[1] Ying-xu. Lai,et al. Unknown Malicious Identification , 2008, World Congress on Engineering.
[2] Peng Li,et al. On Challenges in Evaluating Malware Clustering , 2010, RAID.
[3] Serdar Boztas,et al. A fast randomness test that preserves local detail , 2008 .
[4] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..
[5] Irina E. Krivtsova,et al. METHOD OF EXECUTABLE FILTS IDENTIFICATION BY THEIR SIGNATURES , 2016 .