-
1
-
-
34249665980
-
Diagonalization of matrices
-
Academic Press, New York
-
Arfken, G.: Diagonalization of matrices. In: Mathematical Methods for Physicists, 3rd edn, pp. 217–229. Academic Press, New York (1985)
-
(1985)
Mathematical Methods for Physicists, 3rd edn
, pp. 217-229
-
-
Arfken, G.1
-
2
-
-
84945152586
-
-
Wikipedia: Singular value decomposition. (2014). Accessed 19 July 2014
-
Wikipedia: Singular value decomposition. http://en.wikipedia.org/wiki/Singular_value_decomposition (2014). Accessed 19 July 2014
-
-
-
-
3
-
-
84945152587
-
-
Austin, D.: We recommend a singular value decomposition. Accessed 19 Jul 2014
-
Austin, D.: We recommend a singular value decomposition. http://www.ams.org/samplings/feature-column/fcarc-svd. Accessed 19 Jul 2014
-
-
-
-
4
-
-
84875549453
-
Exploring hidden Markov models for virus analysis: a semantic approach
-
Austin, T., Filiol, E., Josse, S., Stamp, M.: Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii International Conference on System Sciences (HICSS 46), pp. 5039–5048 (2012)
-
(2012)
46th Hawaii International Conference on System Sciences (HICSS 46)
, pp. 5039-5048
-
-
Austin, T.1
Filiol, E.2
Josse, S.3
Stamp, M.4
-
6
-
-
84893000796
-
Structural entropy and metamorphic malware
-
Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. 9(4), 179–192 (2013)
-
(2013)
J. Comput. Virol.
, vol.9
, Issue.4
, pp. 179-192
-
-
Baysa, D.1
Low, R.M.2
Stamp, M.3
-
7
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.3
, pp. 211-220
-
-
Borello, J.1
Me, L.2
-
8
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn. 30, 1145–1159 (1997)
-
(1997)
Pattern Recogn.
, vol.30
, pp. 1145-1159
-
-
Bradley, A.P.1
-
10
-
-
80052787875
-
A malware detection framework based on Kolmogorov complexity
-
Deng, W., et al.: A malware detection framework based on Kolmogorov complexity. J. Computat. Inf. Syst. 7(8):2687–2694 (2011). http://www.jofcis.com/publishedpapers/2011_7_8_2687_2694.pdf
-
(2011)
J. Computat. Inf. Syst
, vol.7
, Issue.8
, pp. 2687-2694
-
-
Deng, W.1
-
11
-
-
84893826510
-
Eigenvalue analysis for metamorphic detection
-
Deshpande, S., Park, Y., Stamp, M.: Eigenvalue analysis for metamorphic detection. J. Comput. Virol. Hacking. Tech. 10(1), 53–65 (2014)
-
(2014)
J. Comput. Virol. Hacking. Tech.
, vol.10
, Issue.1
, pp. 53-65
-
-
Deshpande, S.1
Park, Y.2
Stamp, M.3
-
12
-
-
35348995283
-
Metamorphism, formal grammars and undecidable code mutation
-
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2, 70–75 (2007)
-
(2007)
Int. J. Comput. Sci.
, vol.2
, pp. 70-75
-
-
Filiol, E.1
-
13
-
-
84945152590
-
-
Hsu, C., Chen, C.: SVD-based projection for face recognition. Accessed 19 July 2014
-
Hsu, C., Chen, C.: SVD-based projection for face recognition. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4374514. Accessed 19 July 2014
-
-
-
-
14
-
-
84945152591
-
-
JAMA. Java matrix package. Accessed 19 July 2014
-
JAMA. Java matrix package http://math.nist.gov/javanumerics/jama/. Accessed 19 July 2014
-
-
-
-
17
-
-
84945152592
-
-
Mean vector and covariance matrix, NIST. Accessed 19 July 2014
-
Mean vector and covariance matrix, NIST. http://www.itl.nist.gov/div898/handbook/pmc/section5/pmc541.htm. Accessed 19 July 2014
-
-
-
-
18
-
-
84945152593
-
-
The Mental Driller, Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” (2002).
-
The Mental Driller, Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” (2002). http://vxheavens.com/lib/vmd01.html
-
-
-
-
19
-
-
33845703344
-
What is a support vector machine
-
Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565–1567 (2006). http://marriottschool.net/teacher/IS555/Other/SVM_Readings.pdf
-
(2006)
Nat. Biotechnol
, vol.24
, Issue.12
, pp. 1565-1567
-
-
Noble, W.S.1
-
20
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
21
-
-
84860621757
-
Opcode graph similarity and metamorphic detection
-
Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1–2), 37–52 (2012)
-
(2012)
J. Comput. Virol
, vol.8
, Issue.1-2
, pp. 37-52
-
-
Runwal, N.1
Low, R.M.2
Stamp, M.3
-
22
-
-
82055176044
-
Eigenviruses for metamorphic virus recognition
-
Saleh, M., Mohamed, A., Nabi, A.: Eigenviruses for metamorphic virus recognition. IET Inf. Secur. 5(4), 191–198 (2011)
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.4
, pp. 191-198
-
-
Saleh, M.1
Mohamed, A.2
Nabi, A.3
-
23
-
-
84945152594
-
-
Shlens, J.: A tutorial on principal component analysis. Accessed 19 July 2014
-
Shlens, J.: A tutorial on principal component analysis. http://www.cs.cmu.edu/~elaw/papers/pca.pdf. Accessed 19 July 2014
-
-
-
-
24
-
-
84880591935
-
Simple substitution distance and metamorphic detection
-
Shanmugam, G., Low, R.M., Stamp, M.: Simple substitution distance and metamorphic detection. J. Comput. Virol. Hack. Tech. 9(3), 159–170 (2013)
-
(2013)
J. Comput. Virol. Hack. Tech.
, vol.9
, Issue.3
, pp. 159-170
-
-
Shanmugam, G.1
Low, R.M.2
Stamp, M.3
-
25
-
-
84945152595
-
-
Singular value decomposition, Wolfram MathWorld. Accessed 19 July 2014
-
Singular value decomposition, Wolfram MathWorld. http://mathworld.wolfram.com/SingularValueDecomposition.html. Accessed 19 July 2014
-
-
-
-
26
-
-
80255131297
-
Comparing files using structural entropy
-
Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.4
, pp. 259-265
-
-
Sorokin, I.1
-
27
-
-
84876448803
-
Metamorphic worm that carries its own morphing engine
-
Sridhara, S., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. 9(2), 49–58 (2013)
-
(2013)
J. Comput. Virol.
, vol.9
, Issue.2
, pp. 49-58
-
-
Sridhara, S.1
Stamp, M.2
-
28
-
-
84945152596
-
-
Stamp, M.: A revealing introduction to hidden Markov models (2012).
-
Stamp, M.: A revealing introduction to hidden Markov models (2012). http://www.cs.sjsu.edu/stamp/RUA/HMM.pdf
-
-
-
-
29
-
-
84874559655
-
Chi-squared distance and metamorphic virus detection
-
Toderici, A.H., Stamp, M.: Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hack. Tech. 9(1), 1–14 (2013)
-
(2013)
J. Comput. Virol. Hack. Tech.
, vol.9
, Issue.1
, pp. 1-14
-
-
Toderici, A.H.1
Stamp, M.2
-
31
-
-
84945152597
-
-
Virus Profile: W32/NGVCK, McAfee Inc. Accessed 19 July 2014
-
Virus Profile: W32/NGVCK, McAfee Inc. http://home.mcafee.com/virusinfo/virusprofile.aspx?key=1090050. Accessed 19 July 2014
-
-
-
-
32
-
-
33751208937
-
Hunting for metamorphic engines
-
Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.3
, pp. 211-229
-
-
Wong, W.1
Stamp, M.2
-
33
-
-
79952099736
-
Malware obfuscation techniques: a brief survey
-
You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300 (2010)
-
(2010)
International Conference on Broadband, Wireless Computing, Communication and Applications
, pp. 297-300
-
-
You, I.1
Yim, K.2
-
34
-
-
70349989094
-
Code mutation techniques by means of formal grammars and automatons
-
Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199–207 (2009)
-
(2009)
J. Comput. Virol.
, vol.5
, Issue.3
, pp. 199-207
-
-
Zbitskiy, P.1
-
36
-
-
8644268199
-
Some further theoretical results about computer viruses
-
Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput. J. 47(6), 627–633 (2004)
-
(2004)
Comput. J.
, vol.47
, Issue.6
, pp. 627-633
-
-
Zuo, Z.1
Zhou, M.2
|