Discriminant malware distance learning on structural information for automated malware classification
暂无分享,去创建一个
[1] Terran Lane,et al. Improving malware classification: bridging the static/dynamic gap , 2012, AISec.
[2] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[3] Joris Kinable,et al. Malware classification based on call graph clustering , 2010, Journal in Computer Virology.
[4] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[5] Vinod Yegneswaran,et al. A comparative assessment of malware classification using binary texture analysis and dynamic analysis , 2011, AISec '11.
[6] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[7] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[8] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[9] Gabriele B. Durrant,et al. Journal of the Royal Statistical Society Series A (Statistics in Society). Special Issue on Paradata , 2013 .
[10] Guanhua Yan,et al. Exploring Discriminatory Features for Automated Malware Classification , 2013, DIMVA.
[11] Karthik Raman,et al. Selecting Features to Classify Malware , 2012 .
[12] Hongsheng Xi,et al. SAS: semantics aware signature generation for polymorphic worm detection , 2010, International Journal of Information Security.
[13] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Chris H. Q. Ding,et al. Spectral Relaxation for K-means Clustering , 2001, NIPS.
[15] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[16] Muhammad Zubair Shafiq,et al. PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime , 2009, RAID.
[17] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[18] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[19] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[20] Curtis B. Storlie,et al. Graph-based malware detection using dynamic analysis , 2011, Journal in Computer Virology.
[21] Donghai Tian,et al. SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits , 2011, SecureComm.