Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization
暂无分享,去创建一个
Jianguo Jiang | Yang Wu | Qingjia Huang | Zeming Yang | Yunan Zhang | Chenghao Rong | Zeming Yang | Qingjia Huang | Jianguo Jiang | Yunan Zhang | Chenghao Rong | Yang Wu
[1] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[2] B. S. Manjunath,et al. SigMal: a static signal processing based malware triage , 2013, ACSAC.
[3] Christopher Krügel,et al. BareCloud: Bare-metal Analysis-based Evasive Malware Detection , 2014, USENIX Security Symposium.
[4] Anil K. Jain,et al. A Mixture Model for Clustering Ensembles , 2004, SDM.
[5] Yong Chen,et al. Automatic malware categorization using cluster ensemble , 2010, KDD.
[6] G. McLachlan,et al. The EM algorithm and extensions , 1996 .
[7] Giovanni Vigna,et al. MalGene: Automatic Extraction of Malware Analysis Evasion Signature , 2015, CCS.
[8] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[9] Kang G. Shin,et al. DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles , 2013, ACSAC.
[10] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Engin Kirda,et al. Exploiting diverse observation perspectives to get insights on the malware landscape , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[12] Arun Lakhotia,et al. Identifying Shared Software Components to Support Malware Forensics , 2014, DIMVA.
[13] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[14] Terran Lane,et al. Improving malware classification: bridging the static/dynamic gap , 2012, AISec.
[15] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[16] Christopher Krügel,et al. A Static, Packer-Agnostic Filter to Detect Similar Malware Samples , 2012, DIMVA.
[17] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[18] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[19] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[20] Julia Hirschberg,et al. V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure , 2007, EMNLP.
[21] Bhavani M. Thuraisingham,et al. A scalable multi-level feature extraction technique to detect malicious executables , 2007, Inf. Syst. Frontiers.