Author:
Shiva Darshan S. L.,Jaidhar C. D.
Reference23 articles.
1. Bai, J., Wang, J., Zou, G.: A malware detection scheme based on mining format information. Sci. World J. (2014)
2. Belaoued, M., Mazouzi, S.: A real-time pe-malware detection system based on chi-square test and pe-file features. In: IFIP International Conference on Computer Science and Its Applications$$\_$$_x000D$$\_$$_, pp. 416–425. Springer (2015)
3. Firdausi, I., Erwin, A., Nugroho, A.S., et al.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 201–203. IEEE (2010)
4. Guarnieri, C., Tanasi, A., Bremer, J., Schloesser, M.: Automated malware analysis-cuckoo sandbox (2012)
5. Juwono, J.T., Lim, C., Erwin, A.: A comparative study of behavior analysis sandboxes in malware detection. In: International Conference on New Media (CONMEDIA), p. 73 (2015)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献