메뉴 건너뛰기




Volumn 5, Issue 9, 2011, Pages 1482-1486

Computer virus detection using features ranking and machine learning

Author keywords

Computer virus detection; Data mining; Information gain; Signature based detection; Voted perceptron classification algorithm

Indexed keywords


EID: 81755176870     PISSN: 19918178     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (20)
  • 4
    • 33748978409 scopus 로고    scopus 로고
    • Malware pattern scanning schemes secure against blackbox analysis
    • Filiol, E., 2006. Malware pattern scanning schemes secure against blackbox analysis. J. Comput. Virol., 2(1): 35-50.
    • (2006) J. Comput. Virol , vol.2 , Issue.1 , pp. 35-50
    • Filiol, E.1
  • 5
    • 33947585353 scopus 로고    scopus 로고
    • Evaluation methodology and theoretical model for antiviral behavioral detection strategies
    • Filiol, E., G. Jacob, M.L. Liard, 2007. Evaluation methodology and theoretical model for antiviral behavioral detection strategies. J. Comput. Virol., 3(1): 27-37
    • (2007) J. Comput. Virol , vol.3 , Issue.1 , pp. 27-37
    • Filiol, E.1    Jacob, G.2    Liard, M.L.3
  • 6
    • 0033281425 scopus 로고    scopus 로고
    • Large margin classification using the perceptron algorithm
    • Freund, Y. and R.E. Schapire, 1999. Large margin classification using the perceptron algorithm. In Machine Learning, 37(3): 277-296.
    • (1999) In Machine Learning , vol.37 , Issue.3 , pp. 277-296
    • Freund, Y.1    Schapire, R.E.2
  • 7
    • 54849439170 scopus 로고    scopus 로고
    • Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
    • Hashemi, S., Y. Yang, D. Zabihzadeh and M. Kangavari, 2008. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems, 25(5).
    • (2008) Expert Systems , vol.25 , Issue.5
    • Hashemi, S.1    Yang, Y.2    Zabihzadeh, D.3    Kangavari, M.4
  • 10
    • 12244279567 scopus 로고    scopus 로고
    • Learning to detect malicious executables in the wild
    • In
    • Kolter, J. and M. Maloof, 2004. Learning to detect malicious executables in the wild. In Proceedings of KDD'04.
    • (2004) Proceedings of KDD'04
    • Kolter, J.1    Maloof, M.2
  • 12
    • 0029488806 scopus 로고
    • Mcf A malicious code filter
    • Lo, R., K. Levitt, R. Olsson, 1995. Mcf A malicious code filter. Comput. Secur, 14: 541-566
    • (1995) Comput. Secur , vol.14 , pp. 541-566
    • Lo, R.1    Levitt, K.2    Olsson, R.3
  • 13
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: Report to the infosec research council
    • McGraw, G., G. Morrisett, 2002. Attacking malicious code: report to the infosec research council. IEEE Softw., 17(5): 33-41.
    • (2002) IEEE Softw , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 17
    • 33646414637 scopus 로고    scopus 로고
    • Addison Wesley for Symantec Press, New Jersey, Vx virus dataset, Available from: [Accessed 2 Jan 2011]
    • Szor, P., 2005. The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey, Vx virus dataset, Available from: http://vx.netlux.org [Accessed 2 Jan 2011].
    • (2005) The Art of Computer Virus Research and Defense
    • Szor, P.1
  • 20
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent pe-malware detection system based on association mining
    • In,Zakorzhevsky 2011. Monthly Malware Statistics. Available from: [Accessed 2 July
    • Ye, Y., D. Wang, T. Li and D. Ye, 2008. An intelligent pe-malware detection system based on association mining. In Journal in Computer Virology, Zakorzhevsky, 2011. Monthly Malware Statistics. Available from: http://www.securelist.com/en/analysis/204792182/Monthly_Malware_Statistics_June_ [Accessed 2 July.
    • (2008) Journal in Computer Virology
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.