Author:
Karampatziakis Nikos,Stokes Jack W.,Thomas Anil,Marinescu Mady
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006, pp. 459–468. IEEE (2006)
2. Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A tool for analyzing malware. In: Proceedings of 15th Annual Conference of the European Institute for Computer Antivirus Research, EICAR (2006)
3. Chau, D., Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: Tera-scale graph mining and inference for malware detection. In: Proceedings of SIAM International Conference on Data Mining, SDM 2011 (2011)
4. Chouchane, M., Walenstein, A., Lakhotia, A.: Statistical signatures for fast filtering of instruction-substituting metamorphic malware. In: Proceedings of the Workshop on Recurring Malcode, WORM 2007, pp. 31–37 (2007)
5. Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 32–46 (2005)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Lifecycle of the File;ACM Transactions on Storage;2019-04-20
2. A Survey on Malware Detection Using Data Mining Techniques;ACM Computing Surveys;2018-05-31
3. Effective Malware Detection Based on Behaviour and Data Features;Lecture Notes in Computer Science;2018
4. Marmite;Proceedings of the 33rd Annual Computer Security Applications Conference;2017-12-04
5. Analyzing File-to-File Relation Network in Malware Detection;Lecture Notes in Computer Science;2015