Author:
Naderi Hassan,Vinod P.,Conti Mauro,Parsa Saeed,Alaeiyan Mohammad Hadi
Reference18 articles.
1. G-data. https://www.gdatasoftware.com/blog/2018/03/30610-malware-number-2017 . Accessed 25 July 2018
2. Kaspersky lab. https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-number-of-the-year . Accessed 25 July 2018
3. virusshare. www.virusshare.com . Accessed 6 Sept 2017
4. Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004, vol. 2, pp. 41–42. IEEE (2004)
5. Chvatal, V., Sankoff, D.: Longest common subsequences of two random sequences. J. Appl. Probab. 12(2), 306–315 (1975)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Scalable Malware Detection System Using Distributed Deep Learning;Cybernetics and Systems;2022-05-02
2. A hierarchical layer of atomic behavior for malicious behaviors prediction;Journal of Computer Virology and Hacking Techniques;2022-04-07
3. Scalable malware detection system using big data and distributed machine learning approach;Soft Computing;2021-11-05
4. AutoCombo;Proceedings of the 30th ACM International Conference on Information & Knowledge Management;2021-10-26
5. A New Machine Learning Approach for Malware Classification;Advances in Intelligent Systems and Computing;2021-07-21