Related references
Note: Only part of the references are listed.Performance Analysis and Optimization for SpMV on GPU Using Probabilistic Modeling
Kenli Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)
Enhancing the detection of metamorphic malware using call graphs
Ammar Ahmed E. Elhadi et al.
COMPUTERS & SECURITY (2014)
Hybrid particle swarm optimization for parameter estimation of Muskingum model
Aijia Ouyang et al.
NEURAL COMPUTING & APPLICATIONS (2014)
Classification of malware based on integrated static and dynamic features
Rafiqul Islam et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach
Thomas H. Austin et al.
PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (2013)
A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
Manuel Egele et al.
ACM COMPUTING SURVEYS (2012)
Multiple sequence alignment using the Hidden Markov Model trained by an improved quantum-behaved particle swarm optimization
Jun Sun et al.
INFORMATION SCIENCES (2012)
Automatic analysis of malware behavior using machine learning
Konrad Rieck et al.
JOURNAL OF COMPUTER SECURITY (2011)
Profile hidden Markov models and metamorphic virus detection
Srilatha Attaluri et al.
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES (2009)
Toward automated dynamic malware analysis using CWSandbox
Carsten Willems et al.
IEEE SECURITY & PRIVACY (2007)
Hunting for metamorphic engines
Wing Wong et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2006)
Similarity-based classification of sequences using hidden Markov models
M Bicego et al.
PATTERN RECOGNITION (2004)