-
2
-
-
0029488806
-
MCF: A Malicious Code Filter
-
Nov
-
R.Lo, K.Levitt, and R.Olsson, "MCF: A Malicious Code Filter," Computers & Security, vol.14, no 6, pp. 541-566, Nov 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.1
Levitt, K.2
Olsson, R.3
-
3
-
-
0030216542
-
Neural networks for computer virus recognition
-
Aug
-
G.Tesauro, J.Kephart, and G.Sorkin, " Neural networks for computer virus recognition," IEEE Expert, vol 11, no 4, pp. 5-6, Aug 1996.
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
-
4
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Los Alamitos
-
M.Schultz, E.Eskin, E.Zadok, and S.Stolfo, "Data mining methods for detection of new malicious executables," In Proc of the 2001 IEEE Symposium on Security and Privacy, Los Alamitos, 2001, pp.38-49.
-
(2001)
Proc of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
5
-
-
40649084737
-
-
June, Online, Available
-
Symantec manual.(2003, June). [Online]. Available:: http://www.Symantec. com / avcenter / reference/ heuristc.pdf.
-
(2003)
-
-
-
6
-
-
40649095156
-
-
G.Szappanos, Are There Any Polymorphic Macro Viruses at ALL (and What to Do with Them),in Proceedings of the 12th International Virus Bulletin Conference,2002.
-
G.Szappanos, "Are There Any Polymorphic Macro Viruses at ALL (and What to Do with Them),"in Proceedings of the 12th International Virus Bulletin Conference,2002.
-
-
-
-
7
-
-
40649083450
-
-
Dec, Online, Available
-
Vmware. (2003, Dec). [Online]. Available: http://www.vmware.com.
-
(2003)
-
-
-
8
-
-
0031258214
-
Computer immunology
-
S.Forrest, S.A.Hofmeyr, and A.Somayaji, "Computer immunology," Communications of the ACM, vol. 40, no 10, pp. 88-96, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
9
-
-
40649110896
-
-
Nov, Online, Available
-
Cygnus. (2005, Nov). [Online]. Available: http://sourceware.cygnus.com/ cygwin.
-
(2005)
-
-
-
10
-
-
0034836392
-
Information-Theoretic measures for anomaly detection
-
Oakland
-
W.Lee, and X.Dong, "Information-Theoretic measures for anomaly detection," In Needham,R., Abadi M, eds, Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, 2001, pp. 130-143.
-
(2001)
Needham,R., Abadi M, eds, Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Dong, X.2
-
11
-
-
40649109963
-
-
LIBSVM, May, Online, Available
-
LIBSVM. (2004, May). [Online]. Available: http://www.csie.ntu.edu.tw/ ~cjlin/.
-
(2004)
-
-
-
12
-
-
26944454412
-
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code
-
L. Wang, Y.Jin, eds, Fuzzy Systems and Knowledge Discovery, Springer-Verlag, Berlin Heidelberg New York, Aug
-
B.Zhang, J.Yin, and J.Hao, "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code," In L. Wang, Y.Jin, (eds.): Fuzzy Systems and Knowledge Discovery. LNAI, vol.3613. Springer-Verlag, Berlin Heidelberg New York, Aug 2005, pp. 629-634.
-
(2005)
LNAI
, vol.3613
, pp. 629-634
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
-
13
-
-
26944502079
-
Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm
-
June
-
B.Zhang, J.Yin, D.Zhang, and J.Hao, "Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm," Computer Engineering and Aplications, pp.7-10, June 2005.
-
(2005)
Computer Engineering and Aplications
, pp. 7-10
-
-
Zhang, B.1
Yin, J.2
Zhang, D.3
Hao, J.4
|