메뉴 건너뛰기




Volumn 7, Issue 4, 2011, Pages 259-265

Comparing files using structural entropy

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; ANTIVIRUS SOFTWARES; EDIT DISTANCE; EXECUTABLE CODES; FALSE ALARMS; FILE SCANNING; FILE STORAGE; ITS DATA; MALWARES; STRUCTURAL ENTROPY;

EID: 80255131297     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-011-0153-9     Document Type: Article
Times cited : (61)

References (17)
  • 4
    • 47749141577 scopus 로고    scopus 로고
    • Network traffic classification by common subsequence finding
    • M. Bubak, G. Albadavan, and P. Sloot (Eds.), Berlin: Springer
    • Fabjanski K., Kruk T.: Network traffic classification by common subsequence finding. In: Bubak, M., Albada, G., Sloot, P. (eds) Computational Science-ICCS 2008, vol. 5101, pp. 499-508. Springer, Berlin (2008).
    • (2008) Computational Science-ICCS 2008 , vol.5101 , pp. 499-508
    • Fabjanski, K.1    Kruk, T.2
  • 5
  • 8
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • Lyda R., Hamrock J.: Using entropy analysis to find encrypted and packed malware. IEEE Security Priv. 5(2), 40-45 (2007).
    • (2007) IEEE Security Priv. , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 9
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • IEEE Computer Society, Los Alamitos
    • Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 226-241. IEEE Computer Society, Los Alamitos (2005).
    • (2005) Proceedings of the 2005 IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 10
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • Perdisci R., Lanzi A., Lee W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14), 1941-1946 (2008).
    • (2008) Pattern Recognit. Lett. , vol.29 , Issue.14 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 13
    • 54849441430 scopus 로고    scopus 로고
    • Malware behaviour analysis, extended version
    • Wagener G., State R., Dulaunoy A.: Malware behaviour analysis, extended version. J. Comput. Virol. 4(4), 279-287 (2007).
    • (2007) J. Comput. Virol. , vol.4 , Issue.4 , pp. 279-287
    • Wagener, G.1    State, R.2    Dulaunoy, A.3
  • 16
    • 0015960104 scopus 로고
    • The string-to-string correction problem
    • Wagner R. A., Fischer M. J.: The string-to-string correction problem. J. ACM 21(1), 168-173 (1974).
    • (1974) J. ACM , vol.21 , Issue.1 , pp. 168-173
    • Wagner, R.A.1    Fischer, M.J.2
  • 17
    • 84896460091 scopus 로고    scopus 로고
    • Èntropijnye i drugie sistemnye zakonomernosti. Voprosy upravlenija složnymi sistemami
    • Nauka, Moscow
    • Prangišvili, I. V.: Èntropijnye i drugie sistemnye zakonomernosti. Voprosy upravlenija složnymi sistemami (Entropy and other system laws. Issues of managing complex systems). p. 432. Nauka, Moscow (2003).
    • (2003) Entropy and other system laws. Issues of managing complex systems , pp. 432
    • Prangišvili, I.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.