Unknown Malicious Identification

[1]  Diomidis Spinellis,et al.  Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.

[2]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[3]  Jeffrey O. Kephart,et al.  Biologically Inspired Defenses Against Computer Viruses , 1995, IJCAI.

[4]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[5]  Jianping Yin,et al.  Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code , 2005, FSKD.

[6]  Gary McGraw,et al.  Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.

[7]  William C. Arnold,et al.  AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION , 2000 .

[8]  Feng Wu,et al.  Directional Lifting-Based Wavelet Transform for Multiple Description Image Coding with Quincunx Segmentation , 2005, PCM.

[9]  Marcus A. Maloof,et al.  Learning to detect malicious executables in the wild , 2004, KDD.

[10]  Salvatore J. Stolfo,et al.  USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .

[11]  Zhang Boyun Unknown Computer Virus Detection Based on Multi-naive Bayes Algorithm , 2006 .

[12]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[13]  Gerald Tesauro,et al.  Neural networks for computer virus recognition , 1996 .