Author:
Maulana Rizki Jaka,Kusuma Gede Putra
Subject
Management of Technology and Innovation,Physics and Astronomy (miscellaneous),Engineering (miscellaneous)
Reference28 articles.
1. N. Aziz, Z. Yunos, and R. Ahmad, "A management framework for developing a malware eradication and remediation system to mitigate cyberattacks," in Lecture Notes in Electrical Engineering, 481, 513-521, 2019.
2. R. Bavishi, M. Pradel, and K. Sen, "Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts," 2018.
3. C. Raghuraman, S. Suresh, S. Shivshankar, and R. Chapaneri, "Static and dynamic malware analysis using machine learning," in Advances in Intelligent Systems and Computing, 1045, 793-806, 2020.
4. Abbasi, "Leveraging behavior-based rules for malware family classification," Dec. 2019.
5. H. Lim, "Detecting Malicious Behaviors of Software through Analysis of API Sequence k-grams," Comput. Sci. Inf. Technol., 4, no. 3, 85-91, 2016.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献