Author:
Sayed Samir,Darwish Rania R.,Salem Sameh A.
Publisher
Springer International Publishing
Reference25 articles.
1. Symantec Corporation: Symantec Internet Security Threat Report. Technical report, vol. 71 (2012)
2. The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World. Technical report (2011)
3. Zhong, Y., Yamaki, H., Takakura, H.: A Malware Classification Method based on Similarity of Function Structure. In: IEEE/IPSJ 12th International Symposium on Applications and the Internet, pp. 256–261 (2012)
4. McGraw, G.M.G.: Attacking malicious code: report to the infosec research council. IEEE Softw. 17, 33–41 (2002)
5. Filiol, E.: Malware pattern scanning schemes secure against blackbox analysis. J. Comput. Virol. 2, 35–50 (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A GWO-XGBoost Machine Learning Classifier for Detecting Malware Executables;2023 International Conference on Disruptive Technologies (ICDT);2023-05-11