메뉴 건너뛰기




Volumn 9, Issue 5, 2015, Pages 205-216

A hybrid malicious code detection method based on deep learning

Author keywords

Autoencoder; DBN; Deep learning; Malicious code detection; RBM

Indexed keywords

CLUSTERING ALGORITHMS; COMPLEX NETWORKS; DATA MINING; LEARNING SYSTEMS; NEURAL NETWORKS;

EID: 84930981315     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: 10.14257/ijsia.2015.9.5.21     Document Type: Article
Times cited : (223)

References (16)
  • 1
    • 84924209042 scopus 로고    scopus 로고
    • Symantec Corporation
    • Symantec Internet security threat report trends for 2010 [EB/OL] (2011-04) [2012-07-01]
    • "Symantec Corporation", Symantec Internet security threat report trends for 2010 [EB/OL] (2011-04) [2012-07-01], (2011), http://msisac.cisecurity.org/resources/reports/documents/Symantec, Internet Security Threat report 2010.pdf
    • (2011)
  • 2
    • 56549084673 scopus 로고    scopus 로고
    • Survey of malware detection technical
    • Technical Report, Department of Computer Science, Purdue University
    • N. Idika and A. P Mathur, "Survey of malware detection technical", Technical Report, Department of Computer Science, Purdue University, (2007).
    • (2007)
    • Idika, N.1    Mathur, A.P.2
  • 3
    • 72849148484 scopus 로고    scopus 로고
    • Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis
    • 43rd Annual 2009 International Carnahan Conference, October 5-8, Zurich, Switzerland
    • C. L. Tsai, C. C. Tseng and C. C. Han, Editors, "Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis", 43rd Annual 2009 International Carnahan Conference, (2009) October 5-8, Zurich, Switzerland.
    • (2009)
    • Tsai, C.L.1    Tseng, C.C.2    Han, C.C.3
  • 6
    • 80053022689 scopus 로고    scopus 로고
    • Detection of attackers in services using anomalous host behavior based on traffic flow statistics
    • July 18-21, Munich, Bavaria, Germany
    • Y. Sawaya, A. Kubota and Y. Miyake, Editors, "Detection of attackers in services using anomalous host behavior based on traffic flow statistics", IEEE/IPSJ 11th International Symposium, (2011) July 18-21, Munich, Bavaria, Germany.
    • (2011) IEEE/IPSJ 11th International Symposium
    • Sawaya, Y.1    Kubota, A.2    Miyake, Y.3
  • 9
    • 2442624803 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Wisconsin: University of Wisconsin
    • M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns", Wisconsin: University of Wisconsin, (2006).
    • (2006)
    • Christodorescu, M.1    Jha, S.2
  • 15
    • 0004229976 scopus 로고
    • Distributed representations
    • Tech. Report, University of Toronto
    • G. E. Hinton, "Distributed representations", Tech. Report, University of Toronto, (1984).
    • (1984)
    • Hinton, G.E.1
  • 16
    • 84930999935 scopus 로고    scopus 로고
    • Available on
    • KDDCUP99, Available on, (2007), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.