Techniques in Detection and Analyzing Malware Executables: A Review
暂无分享,去创建一个
[1] Kirti Mathur,et al. A Survey on Techniques in Detection and Analyzing Malware , 2013 .
[2] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Yuval Elovici,et al. Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic , 2007, KI.
[4] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[5] Donald Michie,et al. Machine learning of rules and trees , 1995 .
[6] Parisa Bahraminikoo,et al. Utilization Data Mining to Detect Spyware , 2012 .
[7] Huan Liu,et al. Book review: Machine Learning, Neural and Statistical Classification Edited by D. Michie, D.J. Spiegelhalter and C.C. Taylor (Ellis Horwood Limited, 1994) , 1996, SGAR.
[8] Stefan Katzenbeisser,et al. Detecting Malicious Code by Model Checking , 2005, DIMVA.
[9] Yuval Elovici,et al. Detecting unknown malicious code by applying classification techniques on OpCode patterns , 2012, Security Informatics.
[10] Bhavani M. Thuraisingham. Data Mining for Security Applications , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[11] N. Lavesson,et al. Automated Spyware Detection Using End User License Agreements , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).