Author:
Arra Swetha,Rekha Devi K.
Reference15 articles.
1. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces;Perdisci;NSDI,2010
2. J.A. Morales, A. Al-Bataineh, S. Xu, R. Sandhu, Analyzing and exploiting network behaviors of malware, in: International conference on security and privacy in communication systems. Springer, Berlin, Heidelberg, September 2010, pp. 20-34.
3. R. Dadhia, P. Bahl, U.S. Patent No. 8,256,003. Washington, DC: U.S. Patent and Trademark Office (2012).
4. J. Saxe, K. Berlin, Deep neural network based malware detection using two dimensional binary program features. In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, October 2015, pp. 11-20.
5. Mobile malware detection through analysis of deviations in application network behavior;Shabtai;Computers & Security,2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献