Author:
Salehi Zahra,Sami Ashkan,Ghiasi Mahboobe
Subject
Law,General Computer Science
Reference26 articles.
1. ‘McAfee threats report: first quarter 2012’.
2. ‘3% to 5% of enterprise assets are compromised by bot-driven targeted attack malware’,2008
3. Jesse C Rabek, Roger I Khazan, Scott M Lewandowski, Robert K Cunningham. ‘Detection of injected, dynamically generated, and obfuscated malicious code’. In Proc. of the 2003 ACM Workshop on Rapid Malcode, 2003: 76 – 82.
4. ‘The art of unpacking’;Yason,2007
5. Andreas Moser, Christopher Kruegel, Engin Kirda. ‘Limits of static analysis for malware detection’. In Proc. of Anual Computer Security Application Conf ACSAC, Miami Beach, FL, US, 2007: 421 – 430.
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献