Mining distinguishing patterns based on malware traces
暂无分享,去创建一个
[1] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[2] Li Xian,et al. An Efficient Frequent Subgraph Mining Algorithm , 2007 .
[3] Liu Yong,et al. A Novel Graph Classification Approach Based on Frequent Closed Emerging Patterns , 2007 .
[4] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[5] Stefan Katzenbeisser,et al. Detecting Malicious Code by Model Checking , 2005, DIMVA.
[6] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[7] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[8] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[9] GlezerChanan,et al. Detection of malicious code by applying machine learning classifiers on static features , 2009 .
[10] Pang Jian-min. Fuzzy reasoning model for analysis of program maliciousness , 2010 .
[11] James Bailey,et al. Mining Minimal Contrast Subgraph Patterns , 2006, SDM.
[12] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[13] Jianyong Wang,et al. Efficient Mining of Minimal Distinguishing Subgraph Patterns from Graph Databases , 2008, PAKDD.