메뉴 건너뛰기




Volumn , Issue , 2008, Pages 365-370

A feature selection for malicious detection

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; DATA MINING; FEATURE EXTRACTION; INFORMATION MANAGEMENT; INTERNET; LEARNING SYSTEMS; MINING; ROBOT LEARNING; SOFTWARE ENGINEERING; TECHNICAL PRESENTATIONS; THEOREM PROVING;

EID: 57749168876     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2008.18     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 57749194510 scopus 로고    scopus 로고
    • Gryaznov, D. Scanners of the Year 2000: Heuristics. In: Proceedings of the 5th Virus Bulletin International Conference, Boston, Massachusetts, 1999. 225-234
    • Gryaznov, D. Scanners of the Year 2000: Heuristics. In: Proceedings of the 5th Virus Bulletin International Conference, Boston, Massachusetts, 1999. 225-234
  • 4
    • 57749209767 scopus 로고    scopus 로고
    • Neural networks for computer virus detection
    • Siam, M., Hashem. M., Arafat, S. etc. Neural networks for computer virus detection. WSEAS Transactions on Systems, 2003, 2(3): 598-605
    • (2003) WSEAS Transactions on Systems , vol.2 , Issue.3 , pp. 598-605
    • Siam, M.1    Hashem, M.2    Arafat, S.3
  • 5
    • 33744948585 scopus 로고    scopus 로고
    • Yin jiangping, Hao Jinbo. etc. Unknown computer virus detection based on multi-naive Bayes algorithm
    • Zhang Baoyun, Yin jiangping, Hao Jinbo. etc. Unknown computer virus detection based on multi-naive Bayes algorithm Computer Engineering, 2006, 32(10): 18-21
    • (2006) Computer Engineering , vol.32 , Issue.10 , pp. 18-21
    • Zhang, B.1
  • 6
    • 33744818877 scopus 로고    scopus 로고
    • Li Tao, Liu xiaojie, Li hongbin, An immune-based model for computer virus detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 3810 LNCS, Cryptology and Network Security - 4th International Conference, CANS 2005, 2005. 59-71
    • Li Tao, Liu xiaojie, Li hongbin, An immune-based model for computer virus detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 3810 LNCS, Cryptology and Network Security - 4th International Conference, CANS 2005, 2005. 59-71
  • 7
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter, J.Z., and Maloof, M.A. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research. 2006, 7:2721-2744
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 8
    • 57749186558 scopus 로고    scopus 로고
    • Kephart, J.O., Arnold, W.C. Automatic Extraction of Computer Virus Signatures. In: Proceedings of the 4th Virus Bulletin International Conference, Abingdon, England, 1994. 178-184
    • Kephart, J.O., Arnold, W.C. Automatic Extraction of Computer Virus Signatures. In: Proceedings of the 4th Virus Bulletin International Conference, Abingdon, England, 1994. 178-184
  • 9
    • 33646822481 scopus 로고    scopus 로고
    • Dash, S.K., Reddy, K.S., Pujari, A.K. Episode based masquerade detection. In proceedings of 1st international conference on information systems security, Kolkata, 2005, 3803:251-262
    • Dash, S.K., Reddy, K.S., Pujari, A.K. Episode based masquerade detection. In proceedings of 1st international conference on information systems security, Kolkata, 2005, 3803:251-262
  • 12
    • 0006291183 scopus 로고    scopus 로고
    • A study using n-gram features for text categorization
    • Technical report OEFAI-TR-9830, Austrian research institute for artificial intelligence
    • Furnkranz, J. A study using n-gram features for text categorization. Technical report OEFAI-TR-9830, Austrian research institute for artificial intelligence, 1998
    • (1998)
    • Furnkranz, J.1
  • 13
    • 57749204679 scopus 로고    scopus 로고
    • New malicious code detecting using variable length n-grams
    • Reddy, D.S., Dash, S.K., Pujari, A.K., New malicious code detecting using variable length n-grams. In: Proceedings of ICISS. 2006. 276-288
    • (2006) Proceedings of ICISS , pp. 276-288
    • Reddy, D.S.1    Dash, S.K.2    Pujari, A.K.3
  • 16
    • 57749172615 scopus 로고    scopus 로고
    • Study on SVM learning algorithm Based on Hull vector [D]
    • Zhejiang University
    • LI Donghui. Study on SVM learning algorithm Based on Hull vector [D]. Zhejiang: Zhejiang University, 2006.
    • (2006) Zhejiang
    • Donghui, L.I.1
  • 17
    • 57749204679 scopus 로고    scopus 로고
    • New malicious code detecting using variable length n-grams
    • Reddy, D.S., Dash, S.K., Pujari, A.K.: New malicious code detecting using variable length n-grams. In: Proceedings of ICISS. 2006. 276-288,
    • (2006) Proceedings of ICISS , pp. 276-288
    • Reddy, D.S.1    Dash, S.K.2    Pujari, A.K.3
  • 18
    • 57749171667 scopus 로고    scopus 로고
    • Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Proceedings of the 2000 Virus Bulletin International Conference, Orlando, Florida, 2000
    • Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Proceedings of the 2000 Virus Bulletin International Conference, Orlando, Florida, 2000
  • 19
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • August
    • Tesauro, G., J.O. Kephart and G.B. Sorkin. Neural networks for computer virus recognition. IEEE Expert, August 1996, 11(4):5-6,
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorkin, G.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.