메뉴 건너뛰기




Volumn , Issue , 2013, Pages 777-782

Classification of malware families based on N-grams sequential pattern features

Author keywords

C4.5; Malware Classification; Multilayer Perceptron; N Gram; Sequential Floating Forward Selection; Sequential Pattern; Support Vector Machine

Indexed keywords

C4.5; FORWARD SELECTION; MALWARE CLASSIFICATIONS; MULTI LAYER PERCEPTRON; N-GRAM; SEQUENTIAL PATTERNS;

EID: 84881419776     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIEA.2013.6566472     Document Type: Conference Paper
Times cited : (57)

References (36)
  • 6
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof, "Learning to Detect and Classify Malicious Executables in the Wild" Journal of Machine Learning Research, 2006, pp. 2721-2744.
    • (2006) Journal of Machine Learning Research , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 10
    • 84881421327 scopus 로고    scopus 로고
    • VX Heavens Virus Collection, VX Heavens website, available at http://vx.netlux.org
    • VX Heavens Website
  • 11
    • 84881451782 scopus 로고    scopus 로고
    • IDA-Pro Tool, available at http://www.hex-rays.com
    • IDA-Pro Tool
  • 12
    • 84881429775 scopus 로고    scopus 로고
    • Mining a data reasoning model for personalized text classification
    • L. Pipanmaekaporn and Y. Li, "Mining a Data Reasoning Model for Personalized Text Classification" IEEE Intelligent Informatics Bulletin, 2011, pp. 17-24.
    • (2011) IEEE Intelligent Informatics Bulletin , pp. 17-24
    • Pipanmaekaporn, L.1    Li, Y.2
  • 18
    • 84881404242 scopus 로고    scopus 로고
    • KfNgram, available at http://www.kwicfinder.com/kfNgram
  • 20
    • 0003500248 scopus 로고
    • C4.5: Programs for machine learning
    • J. Ross Quinlan, "C4.5: Programs for Machine Learning" Morgan Kaufman, 1993.
    • (1993) Morgan Kaufman
    • Ross Quinlan, J.1
  • 22
    • 84881455915 scopus 로고    scopus 로고
    • LIBSVM Tool, available at http://www.csie.ntu.edu.tw/~cjlin/
  • 23
    • 0023294949 scopus 로고
    • Computer virus theory and experiments
    • F. Cohen, "Computer Virus Theory and experiments", Computers and Security 6, 1987, pp. 22-35.
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 28
    • 26944454412 scopus 로고    scopus 로고
    • Using fuzzy pattern recognition to detect unknown malicious executables code
    • B. Zhang, J. Yin, and J. Hao, "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code", Fuzzy Systems and Knowledge Discovery. LNCS (LNAI), Vol. 3613, 2005, pp. 629-634.
    • (2005) Fuzzy Systems and Knowledge Discovery. LNCS (LNAI) , vol.3613 , pp. 629-634
    • Zhang, B.1    Yin, J.2    Hao, J.3
  • 34
    • 67650160788 scopus 로고    scopus 로고
    • Source code authorship attribution using n-grams
    • A. Spink, A. Turpin, and M. Wu, Eds. RMIT University, Melbourne, Australia
    • S. Burrows and S. M. M. Tahaghoghi, "Source code authorship attribution using n-grams", In Proceedings of the Twelfth Australasian Document Computing Symposium, A. Spink, A. Turpin, and M. Wu, Eds. RMIT University, Melbourne, Australia, 2007, pp. 32-39.
    • (2007) Proceedings of the Twelfth Australasian Document Computing Symposium , pp. 32-39
    • Burrows, S.1    Tahaghoghi, S.M.M.2
  • 36
    • 77951206726 scopus 로고    scopus 로고
    • CIMDS: Adapting postprocessing techniques of associative classification for malware detection
    • Y. Ye, T. Li, Q. Jiangshan and Y. Wang, "CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection", IEEE: Applications and Reviews, Vol. 40, No. 3, 2010.
    • (2010) IEEE: Applications and Reviews , vol.40 , Issue.3
    • Ye, Y.1    Li, T.2    Jiangshan, Q.3    Wang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.