Author:
Singh Ajay,Handa Anand,Kumar Nitesh,Shukla Sandeep Kumar
Publisher
Springer International Publishing
Reference38 articles.
1. Cohen, F.: Computer Viruses: Theory and experiments (1987).
http://web.eecs.umich.edu/~aprakash/eecs588/handouts/cohen-viruses.html
2. Online malware report generator (2004).
https://www.virustotal.com/
3. Kolbitsch, C., Anubis (2011).
https://seclab.cs.ucsb.edu/academic/projects/projects/anubis/
4. Virusshare - malware repository (2011).
https://virusshare.com/
5. Malshare- malware repository (2012).
http://malshare.com/
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Edge Devices: Malware Classification with Dual-Attention Deep Network;Applied Sciences;2024-05-28
2. TL‐GNN: Android Malware Detection Using Transfer Learning;Applied AI Letters;2024-05-10
3. Enhancing Network Security: Leveraging Isolation Forest for Malware Detection;2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT);2024-05-02
4. A novel machine learning approach for detecting first-time-appeared malware;Engineering Applications of Artificial Intelligence;2024-05
5. Malware Detector Based On Enhanced Vision Transformer;2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS);2024-04-19