PE File-Based Malware Detection Using Machine Learning
暂无分享,去创建一个
[1] B. K. Tripathy,et al. A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach , 2018, ICDCN.
[2] Curtis B. Storlie,et al. Graph-based malware detection using dynamic analysis , 2011, Journal in Computer Virology.
[3] Moritz Contag,et al. Syntia: Synthesizing the Semantics of Obfuscated Code , 2017, USENIX Security Symposium.
[4] Irfan-Ullah Awan,et al. CloudIntell: An intelligent malware detection system , 2017, Future Gener. Comput. Syst..
[5] Yanfang Ye,et al. ISMCS: An intelligent instruction sequence based malware categorization system , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[6] Jules Pagna Disso,et al. Similarity hash based scoring of portable executable files for efficient malware detection in IoT , 2020, Future Gener. Comput. Syst..
[7] Guanghui Liang,et al. A Behavior-Based Malware Variant Classification Technique , 2016 .
[8] Rahil Hosseini,et al. A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.
[9] Roberto Perdisci,et al. MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing , 2016, AsiaCCS.
[10] Edward Raff,et al. An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance , 2017, KDD.
[11] Mahmood Fazlali,et al. Heuristic metamorphic malware detection based on statistics of assembly instructions using classification algorithms , 2015, 2015 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS).
[12] Sattar Hashemi,et al. HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection , 2013, Journal of Computer Virology and Hacking Techniques.
[13] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[14] Arun Lakhotia,et al. Malware and Machine Learning , 2015, Intelligent Methods for Cyber Warfare.
[15] Michalis Polychronakis,et al. Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[16] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[17] Stefano Zanero,et al. Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries , 2015, DIMVA.
[18] Roberto Baldoni,et al. Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..
[19] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[20] Mark Stamp,et al. A comparison of static, dynamic, and hybrid analysis for malware detection , 2015, Journal of Computer Virology and Hacking Techniques.
[21] S. Sitharama Iyengar,et al. A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..
[22] Sakir Sezer,et al. Dynamic Analysis of Malware using Run Time Opcodes , 2017 .
[23] Kang G. Shin,et al. MutantX-S: Scalable Malware Clustering Based on Static Features , 2013, USENIX Annual Technical Conference.
[24] Kieran McLaughlin,et al. SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection , 2013, IEEE Transactions on Information Forensics and Security.
[25] Divya Bansal,et al. Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).
[26] Ilia Nouretdinov,et al. Transcend: Detecting Concept Drift in Malware Classification Models , 2017, USENIX Security Symposium.