A rule based probabilistic technique for malware code detection
暂无分享,去创建一个
[1] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[2] Hans P. Reiser,et al. CloudIDEA: A Malware Defense Architecture for Cloud Data Centers , 2015, OTM Conferences.
[3] Shikha Singh,et al. Cloud Computing Attacks: A Discussion With Solutions , 2014, CloudCom 2014.
[4] Nataasha Raul,et al. Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks , 2012, ArXiv.
[5] Rao Mikkilineni,et al. Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[6] Yanfang Ye,et al. ISMCS: An intelligent instruction sequence based malware categorization system , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[7] Madihah Mohd Saudi,et al. A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS , 2015 .
[8] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[9] Shahid Alam,et al. In-Cloud Malware Analysis and Detection: State of the Art , 2014, SIN.
[10] Dan C. Marinescu,et al. Cloud Computing: Theory and Practice , 2013 .
[11] Hinna Hafeez. Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments , 2017 .
[12] S. Parik,et al. Malware Detection in Cloud Computing Infrastructures , 2015 .
[13] David Hutchison,et al. Malware analysis in cloud computing: Network and system characteristics , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[14] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[15] Survey on Malware Detection Methods , 2009 .
[16] Christie Williams. Applications of Genetic Algorithms to Malware Detection and Creation , 2009 .
[17] Md. Rafiqul Islam,et al. Classification of malware based on integrated static and dynamic features , 2013, J. Netw. Comput. Appl..
[18] Yanfang Ye,et al. CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[19] R. Sarala,et al. Detection of Malicious Code-Injection Attack Using Two Phase Analysis Technique , 2012 .
[20] Manish Sahu,et al. A Review of Malware Detection Based on Pattern Matching Technique , 2014 .
[21] Kirti Mathur,et al. A Survey on Techniques in Detection and Analyzing Malware , 2013 .
[22] Terran Lane,et al. Improving malware classification: bridging the static/dynamic gap , 2012, AISec.
[23] Xiaolei Wang,et al. Accurate mobile malware detection and classification in the cloud , 2015, SpringerPlus.
[24] Anirban Kundu,et al. Memory utilization in cloud computing using transparency , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[25] Ali A. Ghorbani,et al. Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[26] Farzad Sabahi,et al. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology , 2012 .
[27] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[28] Safaa Salam Hatem,et al. Malware Detection in Cloud Computing , 2014 .
[29] Daniele Sgandurra,et al. Cloud security is not (just) virtualization security: a short paper , 2009, CCSW '09.
[30] Igor Santos,et al. OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[31] M. P. Wankhade,et al. Malware and Malware Detection Techniques : A Survey , 2013 .
[32] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[33] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[34] Dilshan Keragala,et al. Detecting Malware and Sandbox Evasion Techniques , 2018 .
[35] Atish,et al. Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2014 .
[36] Mladen A. Vouk,et al. Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.