Large scale ransomware detection by cognitive security
暂无分享,去创建一个
[1] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[2] Christopher Krügel,et al. Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.
[3] Nikos Karampatziakis,et al. Using File Relationships in Malware Classification , 2012, DIMVA.
[4] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[5] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[6] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[7] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[8] Christos Faloutsos,et al. Polonium: Tera-Scale Graph Mining and Inference for Malware Detection , 2011 .
[9] Duen Horng Chau,et al. Guilt by association: large scale malware detection by mining file-relation graphs , 2014, KDD.
[10] CACM Staff,et al. Cybersecurity , 2017, Studies in Big Data.
[11] Cath Everett,et al. Ransomware: to pay or not to pay? , 2016 .