Author:
Lee Taejin,Choi Bomin,Shin Youngsang,Kwak Jin
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference23 articles.
1. Symantec. http://www.symantec.com
2. Mohaisen A, Alrawi O (2013) Unveiling zeus: automated classification of malware samples. In: $$22{{\rm nd}}$$ 22 nd international conference on world wide web companion, pp 829–832
3. Xin H, Tzi-cker C, Shin Kang G (2009) Large-scale malware indexing using function-call graphs. CCS’09, November 9–13
4. Elhadi AAE, Maarof BB (2013) Improving the detection of malware behavior using simplified data dependent api call graph. Int J Secur Appl
5. Dullien T, Rolles R (2004) Graph-based comparison of executable objects. In: IEEE conference on detection of intrusions and malware & vulnerability assessment (DIMVA-2004), pp 161–173
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献