Author:
Huang Xiang,Ma Li,Yang Wenyin,Zhong Yong
Funder
Natural Science Foundation of Guangdong Province
The Features Innovation Program of the Department of Education of Foshan
Basic and Applied Basic Research Fund of Guangdong Province
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Modeling and Simulation,Information Systems,Signal Processing,Theoretical Computer Science,Control and Systems Engineering
Reference26 articles.
1. Damodaran, A., Di Troia, F., Visaggio, C. A., Austin, T. H., & Stamp, M. (2017). A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 13(1), 1–12.
2. Alazab, M., Venkataraman, S., Watters, P. (2010, July). Towards understanding malware behaviour by the extraction of API calls. In 2010 Second Cybercrime and Trustworthy Computing Workshop (pp. 52-59). IEEE.
3. Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), 1–40.
4. Zhang, F. (2003). Implementation Technology and Research on Unknown Virus Detection Method and System (Master’s thesis). Northwestern Polytechnical University, Xi’an, Shaanxi Province, China.
5. Lu, Z. (2013). A Study of Static Malicious Code Detection Method Based on Opcode Sequneces (Master’s thesis). Harbin: Harbin Institute of Technology.
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献