메뉴 건너뛰기




Volumn 172, Issue 1-2, 2005, Pages 241-261

Classification methods in the detection of new malicious emails

Author keywords

Antivirus; Bayesian classifier; Decision tree; Email virus detection

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER VIRUSES; DATA REDUCTION; INFORMATION ANALYSIS; INTERNET; PERSONAL COMPUTERS; STATISTICAL METHODS;

EID: 18144374544     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2004.06.003     Document Type: Article
Times cited : (26)

References (27)
  • 5
    • 85008010113 scopus 로고    scopus 로고
    • Melissa virus creates a new type of threat
    • L. Garber Melissa virus creates a new type of threat Computer 32 6 1999 16 19 < http://www.av.ibm.com/ScientificPapers/White/Anatomy/anatomy.html >
    • (1999) Computer , vol.32 , Issue.6 , pp. 16-19
    • Garber, L.1
  • 11
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • W. Lee, S. Stolfo, K. Mok, A data mining framework for building intrusion detection models, in: IEEE Symposium on Security and Privacy, 1999, pp. 120-132
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 14
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: Report to the Infosec Research Council
    • G. McGraw, and G. Morrisett Attacking malicious code: Report to the Infosec Research Council IEEE Software 17 5 2000 33 41
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 17
    • 0036891022 scopus 로고    scopus 로고
    • An analysis of a model of computer viruses spreading via electronic mail
    • T. Okamoto, and Y. Ishida An analysis of a model of computer viruses spreading via electronic mail Systems and Computers in Japan 33 14 2002 81 90
    • (2002) Systems and Computers in Japan , vol.33 , Issue.14 , pp. 81-90
    • Okamoto, T.1    Ishida, Y.2
  • 20
    • 0003545819 scopus 로고
    • The Internet worm program: An analysis
    • Department of Computer Science, Purdue University
    • E.H. Spafford, The Internet worm program: an analysis, Tech. Report CSD-TR-823, Department of Computer Science, Purdue University, 1988
    • (1988) Tech. Report , vol.CSD-TR-823
    • Spafford, E.H.1
  • 21
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • G. Tesauro, J.O. Kephart, and G.B. Sorkin Neural networks for computer virus recognition IEEE Expert 11 4 1996 5 6
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorkin, G.B.3
  • 22
    • 84944063883 scopus 로고    scopus 로고
    • Trend Micro. < http://www.trend.com.tw/endusers/products/pcc2000.html >
    • Trend Micro.
  • 23
    • 18144379668 scopus 로고    scopus 로고
    • Understanding Heuristics: Symatec's bloodhound technology
    • Understanding Heuristics: Symatec's Bloodhound Technology, Symatec White Paper Series, Vo1. XXXIV
    • Symatec White Paper Series , vol.34
  • 25
    • 18144391324 scopus 로고    scopus 로고
    • Publications of Mississippi State University, Institute for Signal and Information Processing
    • Y.F. Wu, Learning with Bayesian networks, Publications of Mississippi State University, Institute for Signal and Information Processing, 1999
    • (1999) Learning with Bayesian Networks
    • Wu, Y.F.1
  • 26
    • 9444275837 scopus 로고    scopus 로고
    • Probabilistic networks with undirected links for anomaly detection, Workshop on information assurance and security
    • N. Ye, M. Xu, and S.M. Emran Probabilistic networks with undirected links for anomaly detection, Workshop on information assurance and security Proceedings of the IEEE 2000 175 179
    • (2000) Proceedings of the IEEE , pp. 175-179
    • Ye, N.1    Xu, M.2    Emran, S.M.3
  • 27
    • 0034949027 scopus 로고    scopus 로고
    • Fighting against the invisible enemy
    • D. Zenkin Fighting against the invisible enemy Computers & Security 20 2001 316 321
    • (2001) Computers & Security , vol.20 , pp. 316-321
    • Zenkin, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.