Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference56 articles.
1. Agbinya, J.: Hidden Markov modelling (HMM)—an introduction. In: Applied Data Analytics—Principles and Applications, pp. 17–34. River Publishers (2020)
2. Alam, M. S., Vuong, S. T.: Random forest classification for detecting android malware. In: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 663–669 (2013)
3. Annachhatre, C., Austin, T., Stamp, M.: Hidden Markov models for malware classification. J. Comput. Virol. Hack. Tech. 11, 59–73 (2015)
4. Bazrafshan, Z., Hashemi, H., Fard, S. M. H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: The 5th Conference on Information and Knowledge Technology, pp. 113–120 (2013)
5. Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Clustering of Application Behaviors in Windows Environments;2024 IEEE Space, Aerospace and Defence Conference (SPACE);2024-07-22
2. A Robust Long Short-Term Memory Model for Classification of Malware Analysis;2023 International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE);2023-11-02