메뉴 건너뛰기




Volumn , Issue , 2006, Pages 2583-2587

Unknown malicious codes detection based on rough set theory and support vector machine

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA PROCESSING; DATA REDUCTION; ROUGH SET THEORY; SUPPORT VECTOR MACHINES;

EID: 40649091872     PISSN: 10987576     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 2
    • 0029488806 scopus 로고
    • MCF: A Malicious Code Filter
    • Nov
    • R.Lo, K.Levitt, and R.Olsson, "MCF: A Malicious Code Filter," Computers & Security, vol.14, no 6, pp. 541-566, Nov 1995.
    • (1995) Computers & Security , vol.14 , Issue.6 , pp. 541-566
    • Lo, R.1    Levitt, K.2    Olsson, R.3
  • 3
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • Aug
    • G.Tesauro, J.Kephart, and G.Sorkin, " Neural networks for computer virus recognition," IEEE Expert, vol 11, no 4, pp. 5-6, Aug 1996.
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.2    Sorkin, G.3
  • 5
    • 40649084737 scopus 로고    scopus 로고
    • June, Online, Available
    • Symantec manual.(2003, June). [Online]. Available:: http://www.Symantec. com / avcenter / reference/ heuristc.pdf.
    • (2003)
  • 6
    • 40649095156 scopus 로고    scopus 로고
    • G.Szappanos, Are There Any Polymorphic Macro Viruses at ALL (and What to Do with Them),in Proceedings of the 12th International Virus Bulletin Conference,2002.
    • G.Szappanos, "Are There Any Polymorphic Macro Viruses at ALL (and What to Do with Them),"in Proceedings of the 12th International Virus Bulletin Conference,2002.
  • 7
    • 40649083450 scopus 로고    scopus 로고
    • Dec, Online, Available
    • Vmware. (2003, Dec). [Online]. Available: http://www.vmware.com.
    • (2003)
  • 9
    • 40649110896 scopus 로고    scopus 로고
    • Nov, Online, Available
    • Cygnus. (2005, Nov). [Online]. Available: http://sourceware.cygnus.com/ cygwin.
    • (2005)
  • 11
    • 40649109963 scopus 로고    scopus 로고
    • LIBSVM, May, Online, Available
    • LIBSVM. (2004, May). [Online]. Available: http://www.csie.ntu.edu.tw/ ~cjlin/.
    • (2004)
  • 12
    • 26944454412 scopus 로고    scopus 로고
    • Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code
    • L. Wang, Y.Jin, eds, Fuzzy Systems and Knowledge Discovery, Springer-Verlag, Berlin Heidelberg New York, Aug
    • B.Zhang, J.Yin, and J.Hao, "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code," In L. Wang, Y.Jin, (eds.): Fuzzy Systems and Knowledge Discovery. LNAI, vol.3613. Springer-Verlag, Berlin Heidelberg New York, Aug 2005, pp. 629-634.
    • (2005) LNAI , vol.3613 , pp. 629-634
    • Zhang, B.1    Yin, J.2    Hao, J.3
  • 13
    • 26944502079 scopus 로고    scopus 로고
    • Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm
    • June
    • B.Zhang, J.Yin, D.Zhang, and J.Hao, "Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm," Computer Engineering and Aplications, pp.7-10, June 2005.
    • (2005) Computer Engineering and Aplications , pp. 7-10
    • Zhang, B.1    Yin, J.2    Zhang, D.3    Hao, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.