메뉴 건너뛰기




Volumn 5812, Issue , 2005, Pages 1-12

Detecting a malicious executable without prior knowledge of its patterns

Author keywords

Email Filtering; Malicious Executable File; Mining high dimensional data; One class Support Vector Machine; Principal Component Analysis

Indexed keywords

EMAIL FILTERING; MALICIOUS EXECUTABLE FILES; MINING HIGH-DIMENSIONAL DATA; ONE-CLASS SUPPORT VECTOR MACHINES;

EID: 27544499740     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.603174     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 3
    • 27544481189 scopus 로고    scopus 로고
    • Comparison of feature selection and classification algorithms in identifying malicious executables
    • Submitted to
    • D. M. Cai, M. Gokhale and J. Theiler, Comparison of Feature Selection and Classification Algorithms in Identifying Malicious Executables, Submitted to Data and Knowledge Engineering 2003.
    • Data and Knowledge Engineering 2003
    • Cai, D.M.1    Gokhale, M.2    Theiler, J.3
  • 5
    • 27544455677 scopus 로고
    • A cryptographic checksum for integrity protection
    • F. Cohen, A Cryptographic Checksum for Integrity Protection, Computers and Security 6 (1987) 505-510.
    • (1987) Computers and Security , vol.6 , pp. 505-510
    • Cohen, F.1
  • 6
    • 34249753618 scopus 로고
    • Support vector network
    • C. Cortes and V. Vapnik, Support Vector Network, Machine Learning 20 (1995) 273-297.
    • (1995) Machine Learning , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 9
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in Unlabeled Data
    • Edited by D. Barbará and S. Jajodia, (Kluwer Academic Publisher)
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A geometric framework for unsupervised anomaly detection: detecting intrusions in Unlabeled Data. On Application of Data Mining in Computer Security, Edited by D. Barbará and S. Jajodia, (Kluwer Academic Publisher, 2002).
    • (2002) On Application of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 20
    • 0001986205 scopus 로고    scopus 로고
    • Data domain description by support vectors
    • M. Vefieysen, Ed., Brussels, D. Facto Press
    • D. Tax and R. Duin, Data domain description by support vectors, in Proc. ESANN, M. Vefieysen, Ed., Brussels, pp. 251-256, D. Facto Press, 1999.
    • (1999) Proc. ESANN , pp. 251-256
    • Tax, D.1    Duin, R.2
  • 23
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • G. Tesauro, J. O. Kephart, and G. B. Sorkin, Neural Networks for Computer Virus Recognition, IEEE Expert, 11 (1996) 5-6.
    • (1996) IEEE Expert , vol.11 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorkin, G.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.