Author:
Ye Yanfang,Chen Lifei,Wang Dingding,Li Tao,Jiang Qingshan,Zhao Min
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference36 articles.
1. Adleman, L.: An abstract theory of computer viruses (invited talk). In: CRYPTO ’88: Proceedings on Advances in cryptology, pp. 354–374. Springer, New York (1990)
2. Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. RAID 2007. LNCS, vol. 4637, pp 178–197 (2007)
3. Bayer U., Moser A., Kruegel C., Kirda E.: Dynamic analysis of malicious code. J. Comput. Virol. 2, 67–77 (2006)
4. Beaucamps P., Filiol E.: Metamorphism, formal grammars and undecidable code mutation. J. Comp. Sci. 2(1), 70–75 (2007)
5. Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs towards aunified perspective of code protection. J. Comp. Virol. 3(1), 2007
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献