相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Malware Analysis by Combining Multiple Detectors and Observation Windows
Massimo Ficco
IEEE TRANSACTIONS ON COMPUTERS (2022)
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
Fran Casino et al.
IEEE ACCESS (2022)
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
Theodoros Apostolopoulos et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains
Fran Casino et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)
Improving Multivariate Microaggregation through Hamiltonian Paths and Optimal Univariate Microaggregation
Armando Maya-Lopez et al.
SYMMETRY-BASEL (2021)
An Inside Look into the Practice of Malware Analysis
Miuyin Yong Wong et al.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
Eslam Amer et al.
COMPUTERS & SECURITY (2020)
Deep learning based Sequential model for malware analysis using Windows exe API Calls
Ferhat Ozgur Catak et al.
PEERJ COMPUTER SCIENCE (2020)
A Survey on Privacy Properties for Data Publishing of Relational Data
Athanasios Zigomitros et al.
IEEE ACCESS (2020)
Survey of machine learning techniques for malware analysis
Daniele Ucci et al.
COMPUTERS & SECURITY (2019)
Dynamic Malware Analysis in the Modern Era-A State of the Art Survey
Ori Or-Meir et al.
ACM COMPUTING SURVEYS (2019)
Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation
Fran Casino et al.
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2019)
Dynamic API call sequence visualisation for malware classification
Mingdong Tang et al.
IET INFORMATION SECURITY (2019)
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Ethan M. Rudd et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Sparseness Analysis in the Pretraining of Deep Neural Networks
Jun Li et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)
FIRMUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Employing Program Semantics for Malware Detection
Smita Naval et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Youngjoon Ki et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)
A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
Manuel Egele et al.
ACM COMPUTING SURVEYS (2012)
Automatic analysis of malware behavior using machine learning
Konrad Rieck et al.
JOURNAL OF COMPUTER SECURITY (2011)
Graph-based malware detection using dynamic analysis
Blake Anderson et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)
Feature Selection with the Boruta Package
Miron B. Kursa et al.
JOURNAL OF STATISTICAL SOFTWARE (2010)
N-gram analysis for computer virus detection
D. Krishna Sandeep Reddy et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2006)
Global goodness-of-fit tests in logistic regression with sparse data
O Kuss
STATISTICS IN MEDICINE (2002)