Malware Detection Based on Suspicious Behavior Identification
暂无分享,去创建一个
Wen Fu | Jianmin Pang | Cheng Wang | Rongcai Zhao | Xiaoxian Liu | J. Pang | Rongcai Zhao | Cheng Wang | Wen Fu | Xiaoxian Liu
[1] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[2] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Cristina Cifuentes,et al. Intraprocedural static slicing of binary executables , 1997, 1997 Proceedings International Conference on Software Maintenance.
[4] Dingxing Zhang,et al. Using Support Vector Machine to Detect Unknown Computer Viruses , 2006 .
[5] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .