메뉴 건너뛰기




Volumn , Issue , 2001, Pages 38-49

Data mining methods for detection of new malicious executables

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; COMPUTER VIRUSES; CRYPTOGRAPHY; DATA STRUCTURES; ELECTRONIC MAIL; FEATURE EXTRACTION; SECURITY OF DATA;

EID: 0034838197     PISSN: 10637109     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (918)

References (27)
  • 5
    • 85013991690 scopus 로고    scopus 로고
    • Cygnus. GNU Binutils Cygwin
    • (1999)
  • 12
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • (1995) IJCAI
    • Kohavi, R.1
  • 16
    • 85013970863 scopus 로고    scopus 로고
    • Homepage - MacAfee.com
    • (2000)
  • 17
    • 85013888730 scopus 로고    scopus 로고
    • Microsoft. Portable Executable Format
    • (1999)
  • 18
    • 85013864390 scopus 로고    scopus 로고
    • Hexdump
    • (2000)
  • 23
    • 85013942518 scopus 로고    scopus 로고
    • Microsoft hack shows companies are vulnerable
    • REUTERS; October 29
    • (2000) New York Times


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.