Author:
Kapil Divya,Sharma Anupriya,Sharma Deepika,Jain Abhishek
Reference15 articles.
1. R. Rehman, G. Hazarika, and G. Chetia, “Malware threats and mitigation strategies: a survey,” Journal of Theoretical and Applied InformationTechnology 29, 69–73, (2011).
2. X. Li, P. K. Loh, and F. Tan, “Mechanisms of polymorphic and metamorphic viruses,” in European intelligence and security informaticsconference, IEEE pp. 149–154, (2011).
3. A revised taxonomy for intrusion-detection systems
4. Y. Cheng, W. Fan, W. Huang, and J. An, “A shellcode detection method based on full native api sequence and support vector machine,” in IOP Conference Series: Materials Science and Engineering, Vol. 242, p. 012124 (IOP Publishing, 2017).
5. Using feature generation from API calls for malware detection