Author:
Mukesh Sharma Divya,Raval Jigar A.,Upadhyay Hardik
Publisher
Springer International Publishing
Reference11 articles.
1. Chuan, L.L., et al.: Design and development of a new scanning core engine for malware detection. In: 2012 18th Asia-Pacific Conference on Communications (APCC). IEEE (2012)
2. Hsiao, H.W., Chen, D.N., Wu, T.J.: Detecting hiding malicious website using network traffic mining approach. In: 2010 2nd International Conference on Education Technology and Computer, vol. 5. IEEE (2010)
3. Sochor, T., Zuzcak, M.: High-interaction linux honeypot architecture in recent perspective. In: International Conference on Computer Networks. Springer International Publishing (2016)
4. Bazrafshan, Z., et al.: A survey on heuristic malware detection techniques. In: 2013 5th Conference on Information and Knowledge Technology (IKT). IEEE (2013)
5. Galal, H.S., Mahdy, Y.B., Atiea, M.A.: Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 12(2), 59–67 (2016)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献