Author:
Nath Hiran V.,Mehtre Babu M.
Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. The ‘ICEFOG’ APT: A tale of cloak and three daggers. Kaspersky Lab Global Research And Analysis Team(GREAT) (2013)
2. Balduzzi, M., Ciangaglini, V., McArdle, R.: Targeted attacks detection with spunge. Trend Micro Research, EMEA (2013)
3. Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans (2013)
4. Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971–1003 (2012)
5. Bilar, D.: Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics 1(2), 156–168 (2007)
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improving Memory Malware Detection in Machine Learning With Random Forest-Based Feature Selection;Advances in IT Standards and Standardization Research;2024-05-31
2. A Survey on a Novel Cryptojacking Covert Attack;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
3. Detecting Obfuscated Malware Using Graph Neural Networks;Lecture Notes in Electrical Engineering;2023-12-16
4. A Multistage Malware Detection and Classification Model Using Visual Features;2023 4th International Conference on Communication, Computing and Industry 6.0 (C216);2023-12-15
5. AntiMal: an Approach of Malware Detection Employing Swin Transformer;Proceedings of the 2023 13th International Conference on Communication and Network Security;2023-12-06