Simulation on static detection of malicious code based on behavior information gain

[1]  Mauricio G. C. Resende,et al.  A Polynomial-Time Primal-Dual Affine Scaling Algorithm for Linear and Convex Quadratic Programming and Its Power Series Extension , 1990, Math. Oper. Res..

[2]  L. Lei,et al.  A Detection of Malicious Code Based on Minimum Distance Classifier , 2009 .

[3]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[4]  Lior Rokach,et al.  Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features , 2012, J. Mach. Learn. Res..

[5]  Lior Rokach,et al.  Mobile malware detection through analysis of deviations in application network behavior , 2014, Comput. Secur..

[6]  Pedro U. Lima,et al.  Decision-theoretic planning under uncertainty with information rewards for active cooperative perception , 2014, Autonomous Agents and Multi-Agent Systems.

[7]  Juan-Carlos Cano,et al.  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.

[8]  Akihiko Ohsuga,et al.  Malicious Node Detection in Mobile Wireless Sensor Networks , 2015, J. Inf. Process..

[9]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[10]  Junfeng Wang,et al.  A static Android malicious code detection method based on multi-source fusion , 2015, Secur. Commun. Networks.

[11]  Ruchuan Wang,et al.  Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines , 2015 .

[12]  Wanlei Zhou,et al.  A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.

[13]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[14]  S. Oren,et al.  Distribution Locational Marginal Pricing Through Quadratic Programming for Congestion Management in Distribution Networks , 2015, IEEE Transactions on Power Systems.

[15]  Björn E. Ottersten,et al.  Example-dependent cost-sensitive decision trees , 2015, Expert Syst. Appl..

[16]  Lei Zhang,et al.  A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis , 2015, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP).

[17]  Jooyoung Park,et al.  Investigation of the C-SEIRA model for controlling malicious code infection in computer networks , 2015 .

[18]  Haeng-Kon Kim,et al.  Smart Mobile IT Convergence for U-Healthcare Development , 2015 .

[19]  Jeong-Kyung Moon,et al.  A security monitoring method for malicious P2P event detection , 2015, Peer-to-Peer Networking and Applications.

[20]  Alex Borges Vieira,et al.  Characterizing peers communities and dynamics in a P2P live streaming system , 2016, Peer-to-Peer Netw. Appl..

[21]  Ankur Srivastava,et al.  On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[22]  Muthu Ramachandran,et al.  Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.

[23]  Wei Gao,et al.  Distance learning techniques for ontology similarity measuring and ontology mapping , 2017, Cluster Computing.

[24]  Bo Zhang,et al.  Research on dynamic heuristic scanning technique and the application of the malicious code detection model , 2017, Inf. Process. Lett..

[25]  Fang Yu,et al.  Internet of things for smart ports: Technologies and challenges , 2018, IEEE Instrumentation & Measurement Magazine.

[26]  Yuyan Luo,et al.  Simulation analysis of resource-based city development based on system dynamics: A case study of Panzhihua , 2018, Applied Mathematics and Nonlinear Sciences.

[27]  Yifan Li,et al.  Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things , 2018, IEEE Access.

[28]  Yaya Sagna Multidimensional BSDE with Poisson jumps of Osgood type , 2019, Applied Mathematics and Nonlinear Sciences.

[29]  Xuemin Zhang,et al.  Color image chaos encryption algorithm combining CRC and nine palace map , 2019, Multimedia Tools and Applications.