Author:
Kakisim Arzu Gorgulu,Nar Mert,Carkaci Necmettin,Sogukpinar Ibrahim
Publisher
Springer International Publishing
Reference39 articles.
1. AV-Test GmbH AV-Test malware statistics Technical report 2017.
https://www.av-test.org
. Accessed 18 Oct 2018
2. Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in malware: from encryption to metamorphism. Int. J. Comput. Sci. Netw. Secur. 12(8), 74–83 (2012)
3. Szor, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference, pp. 123–144, Abingdon (2001)
4. Han, K.S., Kang, B., Im, E.G.: Malware classification using instruction frequencies. In: Proceedings of the 2011 ACM Symposium on Research in Applied Computation, pp. 298–300. ACM (2011)
5. Lee, J., Jeong, K., Lee, H.: Detecting metamorphic malwares using code graphs. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1970–1977. ACM (2010)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献