A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data
暂无分享,去创建一个
[1] Dimitris Gritzalis,et al. The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? , 2013, 2013 International Conference on Availability, Reliability and Security.
[2] Simson L. Garfinkel,et al. Bringing science to digital forensics with standardized forensic corpora , 2009, Digit. Investig..
[3] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[4] Alan F. Lippman,et al. Video coding for streaming media delivery on the Internet , 2001, IEEE Trans. Circuits Syst. Video Technol..
[5] Susan W. Brenner,et al. The Trojan Horse Defense in Cybercrime Cases , 2004 .
[6] Simson L. Garfinkel,et al. Digital media triage with bulk data analysis and bulk_extractor , 2013, Comput. Secur..
[7] Yongdae Kim,et al. Towards complete node enumeration in a peer-to-peer botnet , 2009, ASIACCS '09.
[8] S. Katzenbeisser,et al. Malware Normalization , 2005 .
[9] I.Venkata Sai Manoj. Cryptography and Steganography , 2010 .