메뉴 건너뛰기




Volumn , Issue , 2005, Pages 378-383

Polymorphic malicious executable scanner by API sequence analysis

Author keywords

[No Author keywords available]

Indexed keywords

API SEQUENCE ANALYSIS; MALWARE; POLYMORPHIC COMPUTER VIRUSES; PORTABLE EXECUTABLE CODE;

EID: 28344446955     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (65)

References (12)
  • 1
    • 0031755126 scopus 로고    scopus 로고
    • Activity pattern analysis by means of sequence-alignment methods
    • W.C. Wilson, "Activity Pattern Analysis by Means of Sequence-Alignment Methods", Environment and Planning, A (30): 1017-1038, 1998.
    • (1998) Environment and Planning , vol.A , Issue.30 , pp. 1017-1038
    • Wilson, W.C.1
  • 4
    • 33646867135 scopus 로고    scopus 로고
    • Inside windows: An in-depth look into the win32 portable executable file format
    • March
    • M. Pierrek, "Inside Windows: An In-Depth Look into the Win32 Portable Executable File Format", MSDN Magazine, March 2002.
    • (2002) MSDN Magazine
    • Pierrek, M.1
  • 7
    • 84861289249 scopus 로고    scopus 로고
    • Symantec Cooperation, http://securityresponse.symantec.com.
  • 10
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen, "Computer Viruses: Theory and Experiments", Computers and Security, Vol. 6: pp. 22-35, 1987.
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.