共 22 条
- [1] Dynamic Malware Detection using API Similarity [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 297 - 301
- [2] Structural entropy and metamorphic malware [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04): : 179 - 192
- [3] Bazrafshan Z., 2015, INF KNOWL TECHN IKT, P1
- [4] Malware Automatic Analysis [J]. 2013 1ST BRICS COUNTRIES CONGRESS ON COMPUTATIONAL INTELLIGENCE AND 11TH BRAZILIAN CONGRESS ON COMPUTATIONAL INTELLIGENCE (BRICS-CCI & CBIC), 2013, : 681 - 686
- [5] Cheng H, 2012, 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), P29, DOI 10.1109/ICWAMTIP.2012.6413432
- [6] Defining Malicious Behavior [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 273 - 278
- [7] Analysis of Malware Behaviour: Using data Mining Clustering Techniques to Support Forensics Investigation [J]. 2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC, 2014, : 54 - 63
- [9] Fraley J. B., 2016, 2016 IEEE 7 ANN UB C, P1
- [10] Kilgallon S, 2017, 2017 RESILIENCE WEEK (RWS), P30, DOI 10.1109/RWEEK.2017.8088644