Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families
暂无分享,去创建一个
[1] Michael Ligh,et al. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .
[2] Matt Bishop,et al. The Art and Science of Computer Security , 2002 .
[3] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[4] Yanfang Ye,et al. IMDS: intelligent malware detection system , 2007, KDD '07.
[5] Igor Kononenko,et al. Machine Learning and Data Mining: Introduction to Principles and Algorithms , 2007 .
[6] David W. Aha,et al. Instance-Based Learning Algorithms , 1991, Machine Learning.
[7] Simen Rune Bragen. Malware detection through opcode sequence analysis using machine learning , 2015 .
[8] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[9] Dragos Gavrilut,et al. Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[10] Yuval Elovici,et al. Unknown Malcode Detection Using OPCODE Representation , 2008, EuroISI.
[11] Jianping Yin,et al. Malicious Codes Detection Based on Ensemble Learning , 2007, ATC.
[12] Irina Rish,et al. An empirical study of the naive Bayes classifier , 2001 .
[13] Nirwan Ansari,et al. Revealing Packed Malware , 2008, IEEE Security & Privacy.
[14] Paul D Jeanne Ellis Ormrod Leedy,et al. Practical Research: Planning and Design , 1974 .
[15] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[16] Charles P. Pfleeger,et al. Security in computing , 1988 .
[17] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[18] Yudong Zhang,et al. Classification of Fruits Using Computer Vision and a Multiclass Support Vector Machine , 2012, Sensors.
[19] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[20] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[21] Ali Hamzeh,et al. A survey on heuristic malware detection techniques , 2013, The 5th Conference on Information and Knowledge Technology.
[22] Robert Sabourin,et al. “One Against One” or “One Against All”: Which One is Better for Handwriting Recognition with SVMs? , 2006 .
[23] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[24] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[25] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[26] Nitesh V. Chawla,et al. Information Gain, Correlation and Support Vector Machines , 2006, Feature Extraction.
[27] Anil K. Jain,et al. Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[28] Lars Arne Sand. Information-based dependency matching for behavioral malware analysis , 2012 .