Simulation on static detection of malicious code based on behavior information gain
暂无分享,去创建一个
Fangcheng He | Pengcheng Wei | Chengxiang Shi | Pengcheng Wei | Chengxiang Shi | Fangcheng He | Chengxiang Shi
[1] Mauricio G. C. Resende,et al. A Polynomial-Time Primal-Dual Affine Scaling Algorithm for Linear and Convex Quadratic Programming and Its Power Series Extension , 1990, Math. Oper. Res..
[2] L. Lei,et al. A Detection of Malicious Code Based on Minimum Distance Classifier , 2009 .
[3] Sajal K. Das,et al. Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.
[4] Lior Rokach,et al. Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features , 2012, J. Mach. Learn. Res..
[5] Lior Rokach,et al. Mobile malware detection through analysis of deviations in application network behavior , 2014, Comput. Secur..
[6] Pedro U. Lima,et al. Decision-theoretic planning under uncertainty with information rewards for active cooperative perception , 2014, Autonomous Agents and Multi-Agent Systems.
[7] Juan-Carlos Cano,et al. CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.
[8] Akihiko Ohsuga,et al. Malicious Node Detection in Mobile Wireless Sensor Networks , 2015, J. Inf. Process..
[9] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[10] Junfeng Wang,et al. A static Android malicious code detection method based on multi-source fusion , 2015, Secur. Commun. Networks.
[11] Ruchuan Wang,et al. Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines , 2015 .
[12] Wanlei Zhou,et al. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.
[13] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[14] S. Oren,et al. Distribution Locational Marginal Pricing Through Quadratic Programming for Congestion Management in Distribution Networks , 2015, IEEE Transactions on Power Systems.
[15] Björn E. Ottersten,et al. Example-dependent cost-sensitive decision trees , 2015, Expert Syst. Appl..
[16] Lei Zhang,et al. A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis , 2015, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP).
[17] Jooyoung Park,et al. Investigation of the C-SEIRA model for controlling malicious code infection in computer networks , 2015 .
[18] Haeng-Kon Kim,et al. Smart Mobile IT Convergence for U-Healthcare Development , 2015 .
[19] Jeong-Kyung Moon,et al. A security monitoring method for malicious P2P event detection , 2015, Peer-to-Peer Networking and Applications.
[20] Alex Borges Vieira,et al. Characterizing peers communities and dynamics in a P2P live streaming system , 2016, Peer-to-Peer Netw. Appl..
[21] Ankur Srivastava,et al. On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[22] Muthu Ramachandran,et al. Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.
[23] Wei Gao,et al. Distance learning techniques for ontology similarity measuring and ontology mapping , 2017, Cluster Computing.
[24] Bo Zhang,et al. Research on dynamic heuristic scanning technique and the application of the malicious code detection model , 2017, Inf. Process. Lett..
[25] Fang Yu,et al. Internet of things for smart ports: Technologies and challenges , 2018, IEEE Instrumentation & Measurement Magazine.
[26] Yuyan Luo,et al. Simulation analysis of resource-based city development based on system dynamics: A case study of Panzhihua , 2018, Applied Mathematics and Nonlinear Sciences.
[27] Yifan Li,et al. Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things , 2018, IEEE Access.
[28] Yaya Sagna. Multidimensional BSDE with Poisson jumps of Osgood type , 2019, Applied Mathematics and Nonlinear Sciences.
[29] Xuemin Zhang,et al. Color image chaos encryption algorithm combining CRC and nine palace map , 2019, Multimedia Tools and Applications.