Affiliation:
1. College of Computer, National University of Defense Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference15 articles.
1. [1] M.E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, “Malware phylogeny generation using permutations of code,” Journal in Computer Virology, vol.1, no.1-2, pp.13-23, 2005.
2. [2] J.D. Seideman, B. Khan, and A.C. Vargas, “Malware biodiversity using static analysis,” International Conference on Future Network Systems and Security, pp.139-155, Springer, 2015.
3. [3] J.D. Seideman, B. Khan, and A.C. Vargas, “Identifying malware genera using the Jensen-Shannon distance between system call traces,” 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), pp.1-7, IEEE, 2014.
4. [4] A. Pfeffer, C. Call, J. Chamberlain, L. Kellogg, J. Ouellette, T. Patten, G. Zacharias, A. Lakhotia, S. Golconda, J. Bay, R. Hall, and D. Scofield, “Malware analysis and attribution using genetic information,” 2012 7th International Conference on Malicious and Unwanted Software (MALWARE), pp.39-45, IEEE, 2012.
5. [5] M.E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, “Malware phylogeny using maximal pi-patterns,” EICAR 2005 Conference: Best Paper Proceedings, pp.156-174, 2005.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献