Author:
Qiao Yong,Yang Yuexiang,He Jie,Tang Chuan,Liu Zhixue
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Willems C, Holz T, Freiling F (2007) Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy, IEEE Computer Society, pp 32–39
2. Bayer U, Moser A, Kruegel C, Kirda E (2006) Dynamic analysis of malicious code. J Comp Virol, Springer, 2(1): 67–77
3. Rieck K, Trinius P, Willems C, Holz T (2011) Automatic analysis of malware behavior using machine learning. J Comp Virol, IOS Press, 19(4): 639–668
4. Lo RW, Levitt KN, Olsson RA (1995) MCF: A malicious code filter. Computers and Security, Elsevier, 14(6): 541–566
5. Christodorescu M, Jha S (2006) Static analysis of executables to detect malicious patterns. DTIC Document
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献