共 26 条
- [1] Fossi M., Egan G., Haley K., Johnson E., Mack T., Adams T., Blackbird J., Low M.K., Mazurek D., McKinney D., Symantec internet security threat report trends for, 16, (2011)
- [2] Gennari J., French D., Defining malware families based on analyst insights, Technologies for Homeland Security (HST), 2011 IEEE International Conference on IEEE, pp. 396-401, (2011)
- [3] Mairh A., Barik D., Verma K., Jena D., Honeypot in network security: a survey, Proceedings of the 2011 International Conference on Communication, Computing & Security ACM, pp. 600-605, (2011)
- [4] Kiemt H., Thuy N.T., Quang T.M.N., A machine learning approach to anti-virus system (artificial intelligence i), IPSJ SIG Notes. ICS, 2004, 125, pp. 61-65, (2004)
- [5] Eskandari M., Khorshidpour Z., Hashemi S., Hdm-analyser: a hybrid analysis approach based on data mining techniques for malware detection, J. Comput. Virol. Hacking Tech., 9, 2, pp. 77-93, (2013)
- [6] Moser A., Kruegel C., Kirda E., Limits of static analysis for malware detection, Twenty-third annual IEEE Computer security applications conference, 2007. ACSAC 2007, pp. 421-430, (2007)
- [7] Wong W., Stamp M., Hunting for metamorphic engines, J. Comput. Virol., 2, 3, pp. 211-229, (2006)
- [8] Egele M., Scholte T., Kirda E., Kruegel C., A survey on automated dynamic malware-analysis techniques and tools, ACM Comput. Surv. (CSUR), 44, 2, (2012)
- [9] Sikorski M., Honig A., Practical malware analysis: the hands-on guide to dissecting malicious software, No Starch Press, (2012)
- [10] Cesare S., Xiang Y., Zhou W., Malwise&# x2014