Author:
Islam Rafiqul,Tian Ronghua,Batten Lynn M.,Versteeg Steve
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference39 articles.
1. Abou-Assaleh T, Cercone N, Keselj V, Sweidan R. N-gram-based detection of new malicious code. In: Proceedings of the 28th annual international computer software and applications conference—workshops and fast abstracts, vol. 02. Washington, DC, USA; IEEE Computer Society: 2004. p. 41–2.
2. Ahmed F, Hameed H, Shafiq MZ, Farooq M. Using spatio-temporal information in API calls with machine learning algorithms for malware detection. In: AISec ‘09: proceedings of the 2nd ACM workshop on Security and artificial intelligence. New York, NY, USA: ACM; 2009. P. 55–62.
3. Automated classification and analysis of internet malware;Bailey;Recent Advances in Intrusion Detection,2007
4. Bayer U, Comparetti PM, Hlauschek C, Kruegel C, Kirda E, 2009. Scalable behavior-based malware clustering. In: Proceedings of the 16th annual network and distributed system security symposium (NDSS 2009). Available from: 〈http://www.isoc.org/isoc/conferences/ndss/09/pdf/11.pdf〉.
5. Opcodes as predictor for malware;Bilar,2007
Cited by
190 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献