Author:
Oprişa Ciprian,Cabău George,Sebestyen Pal Gheorghe
Publisher
Springer International Publishing
Reference18 articles.
1. Abou-Assaleh, T., Cercone, N., Kešelj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004, vol. 2, pp. 41–42. IEEE (2004)
2. Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS, vol. 9, pp. 8–11. Citeseer (2009)
3. Bilar, D.: Opcodes as predictor for malware. Int. J. Electr. Secur. Digit. Forensics 1(2), 156–168 (2007)
4. Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Reading (2002)
5. Cohen, F.: Computational aspects of computer viruses. Comput. Secur. 8(4), 297–298 (1989)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fast Clustering for Massive Collections of Malicious URLs;2021 IEEE 17th International Conference on Intelligent Computer Communication and Processing (ICCP);2021-10-28
2. Solving the Minimum Dominating Set Problem of Partitioned Graphs Using a Hybrid Bat Algorithm;Advances in Intelligent Systems and Computing;2019-11-02