-
1
-
-
0034269416
-
Attacking malicious code: A report to the infosec research council
-
September
-
G. McGraw and G. Morrisett, "Attacking malicious code: A report to the infosec research council," IEEE Software, vol 17, pp. 33-41, September 2000.
-
(2000)
IEEE Software
, vol.17
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
2
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M.Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, "Semantics-aware malware detection," In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 32-46, May 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
3
-
-
33748978409
-
Malware pattern scanning schemes secure against blackbox analysis
-
May
-
E. Filiol, "Malware pattern scanning schemes secure against blackbox analysis," Journal in Computer Virology, vol 2, pp. 35-50, May 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, pp. 35-50
-
-
Filiol, E.1
-
5
-
-
38149089416
-
Automated classification and analysis of internet malware
-
August
-
M. Bailey, J Oberheide, J Andersen, Z. Morley Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," In Proceedings of the 10th Symposium on Recent Advances in Intrusion Detection RAID, pp. 178-197, August 2007.
-
(2007)
Proceedings of the 10th Symposium on Recent Advances in Intrusion Detection RAID
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Morley Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
6
-
-
0003684449
-
-
New York: Springer, pp
-
T. Hastie, R. Tibshirani, and J. Friedman, "The Elements of Statistical Learning Data Mining, Inference, and Prediction," New York: Springer , pp.79-114, 2001.
-
(2001)
The Elements of Statistical Learning Data Mining, Inference, and Prediction
, pp. 79-114
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
7
-
-
16444383160
-
-
R. Xu and II Donald Wunsch, Survey of Clustering Algorithms, IEEE transactions on neural networks, 16, pp. 645-678, May 2005.
-
R. Xu and II Donald Wunsch, "Survey of Clustering Algorithms," IEEE transactions on neural networks, vol. 16, pp. 645-678, May 2005.
-
-
-
-
8
-
-
0001138328
-
A k-means clustering algorithm
-
J. Hartigan and M. Wong, "A k-means clustering algorithm," Applied Statistics, vol. 28, pp. 100-108, 1979.
-
(1979)
Applied Statistics
, vol.28
, pp. 100-108
-
-
Hartigan, J.1
Wong, M.2
-
9
-
-
72549117063
-
-
L. Kaufman and P.J. Rousseeuw PJ, Finding groups in Data: An Introduction to Cluster Analysis, New York: Wiley, March 1990.
-
L. Kaufman and P.J. Rousseeuw PJ, "Finding groups in Data: An Introduction to Cluster Analysis," New York: Wiley, March 1990.
-
-
-
-
10
-
-
33749040682
-
Hybrid Clustering Method for DNA Microarray Data Analysis
-
S. Kwon and C. Han, "Hybrid Clustering Method for DNA Microarray Data Analysis," Genome Informatics, vol. 13, pp. 258-259, 2002
-
(2002)
Genome Informatics
, vol.13
, pp. 258-259
-
-
Kwon, S.1
Han, C.2
-
11
-
-
33749074269
-
Novel Hybrid Hierarchical-K-means Mehod (H-K-means) for Microarray Analysis
-
Chen, B. Tai, P.C. Harrison, and R. Yi Pan, "Novel Hybrid Hierarchical-K-means Mehod (H-K-means) for Microarray Analysis," Computational Systems Bioinformatics conference, pp. 105-108, 2005.
-
(2005)
Computational Systems Bioinformatics conference
, pp. 105-108
-
-
Chen1
Tai, B.2
Harrison, P.C.3
Yi Pan, R.4
-
12
-
-
58049189711
-
Protein Sequence Motif Super-Rule-Tree (SRT) Structure Constructed by Hybrid Hierarchical K-means Clustering Algorithm
-
November
-
Chen, B. Jieyue He, Pellicer, and S. Yi Pan, "Protein Sequence Motif Super-Rule-Tree (SRT) Structure Constructed by Hybrid Hierarchical K-means Clustering Algorithm," Conf. BIBM 2008, pp. 98-103, November 2008.
-
(2008)
Conf. BIBM 2008
, pp. 98-103
-
-
Chen1
Jieyue He, B.2
Pellicer3
Yi Pan, S.4
-
13
-
-
34047238288
-
On the two-level hybrid clustering algorithm
-
EY. Cheu, C. Keongg, and Z. Zhou, "On the two-level hybrid clustering algorithm," In International conf. on artificial intelligence in science and technology, pp. 138-142, 2004.
-
(2004)
International conf. on artificial intelligence in science and technology
, pp. 138-142
-
-
Cheu, E.Y.1
Keongg, C.2
Zhou, Z.3
-
14
-
-
0001404416
-
A new method of choosing the number of clusters for the fuzzy c-means method
-
Y. Fukuyama and M. Sugeno, "A new method of choosing the number of clusters for the fuzzy c-means method," Proc. 5th Fuzzy Syst. Symp, pp. 247-250, 1989.
-
(1989)
Proc. 5th Fuzzy Syst. Symp
, pp. 247-250
-
-
Fukuyama, Y.1
Sugeno, M.2
-
15
-
-
61649101167
-
Fileprint analysis for Malware Detection
-
June
-
S.J. Stolfo, K. Wang, and W.J. Li, "Fileprint analysis for Malware Detection," WORMS 2005, June 2005.
-
(2005)
WORMS 2005
-
-
Stolfo, S.J.1
Wang, K.2
Li, W.J.3
-
17
-
-
33646515970
-
Text categorization with class-based and corpus-based keyword selection
-
A. Ozgur, L. Ozgur, and T. Gungor, "Text categorization with class-based and corpus-based keyword selection," In Proceedings of the 20th International Symposium on Computer and Information Sciences, vol. 3733, pp. 607-616, 2005.
-
(2005)
Proceedings of the 20th International Symposium on Computer and Information Sciences
, vol.3733
, pp. 607-616
-
-
Ozgur, A.1
Ozgur, L.2
Gungor, T.3
-
18
-
-
36849096063
-
IMDS: Intelligent malware detection system
-
Y. Ye, D.Wang, T. Li, and D. Ye, "IMDS: Intelligent malware detection system," In Proccedings of ACM International onference on Knowlege Discovery and Data Mining, pp. 1043-1047, 2007.
-
(2007)
In Proccedings of ACM International onference on Knowlege Discovery and Data Mining
, pp. 1043-1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
-
19
-
-
54849412646
-
An intelligent PE-malware detection system based on association mining
-
Y. Ye, D.Wang, T. Li, D. Ye and Q. Jiang, "An intelligent PE-malware detection system based on association mining." Journal in Computer Viorology, 2008.
-
(2008)
Journal in Computer Viorology
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
|