Author:
Zhang Kai,Li Chao,Wang Yong,Zhu Xiaobin,Wang Haiping
Reference26 articles.
1. Using file relationships in malwareclassification;Karampatziakis;Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment,2012
2. E. E. Papalexakis, T. Dumitras, D. H. P. Chau, B. A. Prakash, and C. Faloutsos. Spatio-temporal mining of software adoption & penetration. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 878-885, 2013.
3. X. Hu, S. Bhatkar, K. Griffin, and K. G. Shin.Mutantx-s: Scalable malware clustering based onstatic features. In Proceedings of USENIX AnnualTechnical Conference, pages 187-198, 2013.
4. Automated classification and analysis of internet malware;Bailey;International Workshop on Recent Advances in Intrusion Detection,2007
5. X.Y. Zhang, Z. Hou, X. Zhu, G. Wu, S. Wang: Robust malware detection with dual-lane AdaBoost. In Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1051-1052, 2016.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献