共 36 条
- [11] Damodaran A., Combining dynamic and static analysis for malware detection, Master’s report, Department of Computer Science, San Jose State University, (2015)
- [12] Deshpande P., Metamorphic detection using function call graph analysis, Master’s report, Department of Computer Science, San Jose State University, (2013)
- [13] Deshpande S., Park Y., Stamp M., Eigenvalue analysis for metamorphic detection, J. Comput. Virol. Hack. Techn., 10, 1, pp. 53-65, (2014)
- [14] Dinaburg A., Royal P., Sharif M., Lee W., Ether: Malware analysis via hardware virtualization extensions, CCS 08, October 27–31, (2008)
- [15] Egele M., Scholte T., Kirda E., Kruegel C., A survey on automated dynamic malware analysis techniques and tools, J. ACM Comput. Surv. 44(2):Article, (2012)
- [16] Eskandari M., Hashemi S., A graph mining approach for detecting unknown malwares, J. Vis. Lang. Comput., 23, 3, pp. 154-162, (2012)
- [17] Eskandari M., Khorshidpour Z., Hashemi S., HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection, J. Comput. Virol. Hack. Techn., 9, 2, pp. 77-93, (2013)
- [18] Eskandari M., Khorshidpur Z., Hashemi S., To incorporate sequential dynamic features in malware detection engines, Intelligence and Security Informatics Conference (EISIC), pp. 46-52, (2012)
- [19] Ghahramani Z., An introduction to hidden Markov models and Bayesian networks, Int. J. Pattern Recognit. Artif. Intell., 15, 1, pp. 9-42, (2001)
- [20] Jacob G., Debar H., Filiol E., Behavioral detection of malware: From a survey towards an established taxonomy, J. Comput. Virol., 4, 3, pp. 251-266, (2008)