Author:
Wu Yumeng,Zeng Jianjun,Zhang Zhenjiang,Li Wei,Zhang Zhiyuan,Zhang Yang
Publisher
Springer Nature Switzerland
Reference17 articles.
1. Zhang, Y., Li, B.: Malicious code detection based on code semantic features. IEEE Access 8, 176728–176737 (2020)
2. Kang, B.B.H., Srivastava, A.: Dynamic malware analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 367–368. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_846
3. Zhang, B., Qianmua, L., Ma, Y.: Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf. Process. Lett. 117(jan.), 19–24 (2017)
4. Sung, A.H., Xu, J., Chavez, P., et al.: Static analyzer of vicious executables (SAVE). In: 2004 20th Annual Computer Security Applications Conference. IEEE Computer Society (2005)
5. Han, L., Qian, M., Xu, X., et al.: Malicious code detection model based on behavior association. Tsinghua Sci. Technol. 19(5), 508–515 (2014)