Author:
Chouchane Mohamed R.,Walenstein Andrew,Lakhotia Arun
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MetaHunt;Proceedings of the 3rd ACM Workshop on Software Protection - SPRO'19;2019
2. Metamorphic Malware Detection Using Minimal Opcode Statistical Patterns;Security and Privacy Management, Techniques, and Protocols;2018
3. An entropy-based distance measure for analyzing and detecting metamorphic malware;Applied Intelligence;2017-08-24
4. Detecting machine-morphed malware variants via engine attribution;Journal of Computer Virology and Hacking Techniques;2013-03-05
5. VILO: a rapid learning nearest-neighbor classifier for malware triage;Journal of Computer Virology and Hacking Techniques;2013-03-05