Profile hidden Markov models and metamorphic virus detection
暂无分享,去创建一个
[1] Colin Haynes,et al. Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System: What They Are, how They Work, and how to Defend Your PC or Mainframe , 1989 .
[2] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[3] Lisa J. Carnahan,et al. Anti-virus tools and techniques for computer systems , 1995 .
[4] S. Eddy. Hidden Markov models. , 1996, Current opinion in structural biology.
[5] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[6] Durbin,et al. Biological Sequence Analysis , 1998 .
[7] Sean R. Eddy,et al. Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids , 1998 .
[8] Sean R. Eddy,et al. Profile hidden Markov models , 1998, Bioinform..
[9] Anders Krogh,et al. Chapter 4 - An introduction to hidden Markov models for biological sequences , 1998 .
[10] D. Mount. Bioinformatics: Sequence and Genome Analysis , 2001 .
[11] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[12] Nancy Forbes,et al. Computer Immune Systems , 2005 .
[13] Mark Stamp,et al. Information security - principles and practice , 2005 .
[14] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[15] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[16] Mattia Monga,et al. Using Code Normalization for Fighting Self-Mutating Malware , 2006, ISSSE.
[17] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[18] R. Doolittle,et al. Progressive sequence alignment as a prerequisitetto correct phylogenetic trees , 2007, Journal of Molecular Evolution.
[19] Eric Filiol,et al. Metamorphism, Formal Grammars and Undecidable Code Mutation , 2007 .
[20] Scott McGhee. PAIRWISE ALIGNMENT OF METAMORPHIC COMPUTER VIRUSES , 2007 .
[21] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[22] Matemática. Prim's Algorithm , 2010 .