Funder
National Key R&D Program of China
Key Program of National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference58 articles.
1. Symantec internet security threat report (2019). https://docs.broadcom.com/docs/istr-24-2019-en/
2. Av-test institute (2020). https://www.av-test.org/en/statistics/malware/ Accessed 20 Sept 2020
3. Bazrafshan Z, Hashemi H, Fard SMH, Hamzeh A (2013) A survey on heuristic malware detection techniques. In: Proceedings of the international conference on information and knowledge technology, IEEE, pp 113–120
4. Christodorescu M, Jha S, Kruegel C (2008) Mining specifications of malicious behavior. In: Proceedings of the joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pp 5–14
5. Cui Z, Xue F, Cai X, Cao Y, Wang Gg, Chen J (2018) Detection of malicious code variants based on deep learning. IEEE Trans Industrial Inform 14(7):3187–3196