Author:
Kashyap Pavan R.,Katti Phaneesh R.,Hrishikesh Bhat P.,Hegde Pranav K.,Sushma Ethadi,Prasad Honnavalli B.
Publisher
Springer Nature Singapore
Reference13 articles.
1. Cybersecurity and Infrastructure Security Agency (2021) Top Malware strains, [online], Last Accessed: 25 Oct 2023. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-216a
2. Faridi H, Srinivasagopalan S, Verma R (2018) Performance evaluation of features and clustering algorithms for Malware, 13–22. https://doi.org/10.1109/ICDMW.2018.00010
3. Wai FK, Thing VLL (2021) Clustering based opcode graph generation for malware variant detection. In: 2021 18th international conference on Privacy, Security and Trust (PST), IEEE. https://doi.org/10.1109/pst52912.2021.9647814
4. Wu C-Y, Tao B, Shin-Ming C, Takeshi T, Daisuke I (2023) IoT malware classification based on reinterpreted function-call graphs. Comput Secur 125:103060. ISSN 0167–4048. https://doi.org/10.1016/j.cose.2022.103060
5. Basole S, Stamp M (2021) Cluster analysis of Malware family relationships. https://doi.org/10.48550/arXiv.2103.05761