Author:
Yuxin Ding,Xuebing Yuan,Di Zhou,Li Dong,Zhanchao An
Subject
Law,General Computer Science
Reference26 articles.
1. Abou-Assaleh T, Cercone N, Keselj V. Detection of new malicious code using n-grams signatures. In: Proceedings of second annual conference on privacy, security and trust, Brunswick, Canada; Oct. 2004a. p. 193–198.
2. Abou-Assaleh T, Keselj V, Sweid R. N-gram-based detection of new malicious code. In: 28th annual international computer software and applications conference, Hong Kong; Sept. 2004b. p. 41–46.
3. Bergeron J, Debbabi M, Desharnais J, Erhioui MM, Lavoie Y, Tawbi N. Static detection of malicious code in executable programs. In: Symposium on requirements engineering for information security (SREIS’01), Indianapolis, Indiana, USA; March 2001. p. 157–166.
4. Cha BR, Vaidya B, Han S. Anomaly intrusion detection for system call using the Soundex algorithm and neural networks. In: 10th IEEE symposium on computer and communications, Cartagena, Murcia, Spain; June 2005. p. 427–433.
5. Dash SK, Reddy KS, Pujari AK. Episode based Masquerade detection. In: Proceedings of 1st International conference on information systems security, Kolkata, India; December 2005. p. 251–262.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献