Unknown Malicious Identification
暂无分享,去创建一个
[1] Diomidis Spinellis,et al. Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.
[2] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3] Jeffrey O. Kephart,et al. Biologically Inspired Defenses Against Computer Viruses , 1995, IJCAI.
[4] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Jianping Yin,et al. Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code , 2005, FSKD.
[6] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.
[7] William C. Arnold,et al. AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION , 2000 .
[8] Feng Wu,et al. Directional Lifting-Based Wavelet Transform for Multiple Description Image Coding with Quincunx Segmentation , 2005, PCM.
[9] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[10] Salvatore J. Stolfo,et al. USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .
[11] Zhang Boyun. Unknown Computer Virus Detection Based on Multi-naive Bayes Algorithm , 2006 .
[12] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[13] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .