相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Android malware detection through generative adversarial networks
Muhammad Amin et al.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)
Static malware detection and attribution in android byte-code through an end-to-end deep system
Muhammad Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Malware detection in mobile environments based on Autoencoders and API-images
Gianni D'Angelo et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
Tobias Wuchner et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Malware Detection Based on Deep Learning of Behavior Graphs
Fei Xiao et al.
MATHEMATICAL PROBLEMS IN ENGINEERING (2019)
Considering Quarantine in the SIRA Malware Propagation Model
Jose Roberto C. Piqueira et al.
MATHEMATICAL PROBLEMS IN ENGINEERING (2019)
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient
Taejin Lee et al.
JOURNAL OF SUPERCOMPUTING (2018)
A malware detection method based on family behavior graph
Yuxin Ding et al.
COMPUTERS & SECURITY (2018)
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis
Ming Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A Secure Encryption-Based Malware Detection System
Zhaowen Lin et al.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2018)
Malytics: A Malware Detection Scheme
Mahmood Yousefi-Azar et al.
IEEE ACCESS (2018)
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis
Ming Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
A graph-based model for malware detection and classification using system-call groups
Stavros D. Nikolopoulos et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2017)
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
Sanjeev Das et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
A framework for metamorphic malware analysis and real-time detection
Shahid Alam et al.
COMPUTERS & SECURITY (2015)
Approximate TF-IDF based on topic extraction from massive message stream using the GPU
Ugo Erra et al.
INFORMATION SCIENCES (2015)
Enhancing the detection of metamorphic malware using call graphs
Ammar Ahmed E. Elhadi et al.
COMPUTERS & SECURITY (2014)
Deriving common malware behavior through graph clustering
Younghee Park et al.
COMPUTERS & SECURITY (2013)
The graph matching problem
Lorenzo Livi et al.
PATTERN ANALYSIS AND APPLICATIONS (2013)
Interpreting TF-IDF term weights as making relevance decisions
Ho Chung Wu et al.
ACM TRANSACTIONS ON INFORMATION SYSTEMS (2008)
What are decision trees?
Carl Kingsford et al.
NATURE BIOTECHNOLOGY (2008)
Random forest: A classification and regression tool for compound classification and QSAR modeling
V Svetnik et al.
JOURNAL OF CHEMICAL INFORMATION AND COMPUTER SCIENCES (2003)