Author:
Mohamed Gamal A. N.,Ithnin Norafida Bte
Publisher
Springer International Publishing
Reference33 articles.
1. Galal, H.S., Mahdy, Y.B., Atiea, M.A.: Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 12(2), 59–67 (2016)
2. Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Heidelberg (2006)
3. Christodorescu, M., et al.: Malware Normalization. University of Wisconsin, Madison (2005)
4. McGraw, G., Morrisett, G.: Attacking malicious code: a report to the Infosec research council. IEEE Softw. 17(5), 33 (2000)
5. Lee, T., Kwak, J.: Effective and reliable malware group classification for a massive malware environment. Int. J. Distrib. Sensor Netw. 2016, 6 (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献