SCARECROW: Scalable Malware Reporting, Detection and Analysis
暂无分享,去创建一个
Abdul Rahman Ramli | Raja Syamsul Azmir Raja Abdullah | Shaiful Jahari Hashim | Fazirulhisyam Hashim | Osamah L. Barakat | Ibrahim Ahmed Al-Baltah | Khairulmizam Samsudin | Mohamed Mustafa Al-Habshi | A. R. Ramli | F. Hashim | K. Samsudin | S. Hashim | Raja Syamsul Azmir Raja Abdullah | I. Al-Baltah | M. M. Al-Habshi
[1] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[2] Kasmiran Jumari,et al. Computer network intrusion detection software development , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[3] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[4] Abdul Rahman Ramli,et al. Malware analysis performance enhancement using cloud computing , 2013, Journal of Computer Virology and Hacking Techniques.
[5] Andrés G. Castillo Sanz,et al. Malware detection based on Cloud Computing integrating Intrusion Ontology representation , 2010 .
[6] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[7] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[8] Chen Lin,et al. RkFinder: A Practical Anti-malware system Based on VMM , 2012 .
[9] Yi Ming Chen,et al. Retrospective Detection of Malware Attacks by Cloud Computing , 2010, CyberC 2010.
[10] Samuel T. King,et al. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.
[11] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[12] Xiuguo Wu. MWfSCC: A Migrating Workflow System Based on Cloud Computing Paradigm , 2012 .
[13] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[14] Ken Chiang,et al. Farm: An automated malware analysis environment , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[15] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[16] Rodney S. Tucker,et al. Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.
[17] Lorenzo Martignoni,et al. A Framework for Behavior-Based Malware Analysis in the Cloud , 2009, ICISS.
[18] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .