-
2
-
-
84964884361
-
-
arXiv
-
Ahmadi, M., Giacinto, G., Ulyanov, D., Semenov, S. Trofimov, M. (2015). Novel feature extraction, selection and fusion for effective malware family classification. arXiv: http://arxiv.org/abs/1511.04317.
-
(2015)
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
-
-
Ahmadi, M.1
Giacinto, G.2
Ulyanov, D.3
Semenov, S.4
Trofimov, M.5
-
7
-
-
84961342029
-
-
Accessed 22.06.14
-
C32Asm (2011). https://tuts4you.com/download.php?view.1130. Accessed 22.06.14.
-
(2011)
C32Asm
-
-
-
8
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
Egele M., Scholte T., Kirda E., and Kruegel C. A survey on automated dynamic malware-analysis techniques and tools Computing Surveys 44 2012 6
-
(2012)
Computing Surveys
, vol.44
, pp. 6
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
10
-
-
0242712881
-
KNN model-based approach in classification
-
Springer
-
Guo G., Wang H., Bell D., Bi Y., and Greer K. KNN model-based approach in classification Volume 2888 of Lecture notes in computer science 2003 Springer 986 996
-
(2003)
Volume 2888 of Lecture Notes in Computer Science
, pp. 986-996
-
-
Guo, G.1
Wang, H.2
Bell, D.3
Bi, Y.4
Greer, K.5
-
15
-
-
69449099775
-
Classification of software behaviors for failure detection: a discriminative pattern mining approach
-
Lo D., Cheng H., Han J., Khoo S., and Sun C. Classification of software behaviors for failure detection: a discriminative pattern mining approach Proceedings of the 15th international conference on knowledge discovery and data mining 2009 557 566
-
(2009)
Proceedings of the 15th International Conference on Knowledge Discovery and Data Mining
, pp. 557-566
-
-
Lo, D.1
Cheng, H.2
Han, J.3
Khoo, S.4
Sun, C.5
-
16
-
-
84928243451
-
DLLMiner: Structural mining for malware detection
-
Narouei M., Ahmadi M., Giacinto G., Takabi H., and Sami A. DLLMiner: Structural mining for malware detection Security and Communication Networks 8 2015 3311 3322
-
(2015)
Security and Communication Networks
, vol.8
, pp. 3311-3322
-
-
Narouei, M.1
Ahmadi, M.2
Giacinto, G.3
Takabi, H.4
Sami, A.5
-
18
-
-
84888392996
-
CBM: Free, automatic malware analysis framework using API call sequences
-
Springer
-
Qiao Y., Yang Y., He J., Tang C., and Liu Z. CBM: Free, automatic malware analysis framework using API call sequences Knowledge engineering and management 2014 Springer 225 236
-
(2014)
Knowledge Engineering and Management
, pp. 225-236
-
-
Qiao, Y.1
Yang, Y.2
He, J.3
Tang, C.4
Liu, Z.5
-
22
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
Springer
-
Santos I., Brezo F., Nieves J., Penya Y.K., Sanz B., Laorden C., and Bringas P.G. Idea: Opcode-sequence-based malware detection Engineering secure software and system 2010 Springer 35 43
-
(2010)
Engineering Secure Software and System
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, Y.K.4
Sanz, B.5
Laorden, C.6
Bringas, P.G.7
-
24
-
-
84872176999
-
Detecting unknown malicious code by applying classification techniques on opcode patterns
-
Shabtai A., Moskovitch R., Feher C., Dolev S., and Elovici Y. Detecting unknown malicious code by applying classification techniques on opcode patterns Security Informatics 1 2012 1 22
-
(2012)
Security Informatics
, vol.1
, pp. 1-22
-
-
Shabtai, A.1
Moskovitch, R.2
Feher, C.3
Dolev, S.4
Elovici, Y.5
-
28
-
-
58349117882
-
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
-
Sun W.C., and Chen Y.M. A rough set approach for automatic key attributes identification of zero-day polymorphic worms Expert Systems with Applications 36 2009 4672 4679
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 4672-4679
-
-
Sun, W.C.1
Chen, Y.M.2
-
29
-
-
84952766034
-
Malware detection via API calls, topic models and machine learning
-
Sundarkumar G.G., Ravi V., Nwogu I., and Govindaraju V. Malware detection via API calls, topic models and machine learning Proceedings of the international conference on automation science and engineering 2015 1212 1217
-
(2015)
Proceedings of the International Conference on Automation Science and Engineering
, pp. 1212-1217
-
-
Sundarkumar, G.G.1
Ravi, V.2
Nwogu, I.3
Govindaraju, V.4
-
30
-
-
84961334857
-
-
Accessed 17.12.15
-
Symantec (2015). Symantec intelligent report: October 2015. http://www.symantec.com/content/en/us/enterprise/otherresources/b-intelligencereport102015enus.pdf. Accessed 17.12.15.
-
(2015)
Symantec Intelligent Report: October 2015
-
-
-
31
-
-
84927593020
-
Malware detection and classification based on extraction of API sequences
-
Uppal D., Sinha R., Mehra V., and Jain V. Malware detection and classification based on extraction of API sequences Proceedings of the international conference on advances in computing, communications and informatics 2014 2337 2342
-
(2014)
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
, pp. 2337-2342
-
-
Uppal, D.1
Sinha, R.2
Mehra, V.3
Jain, V.4
-
35
-
-
54849412646
-
An intelligent PE-malware detection system based on association mining
-
Ye Y., Wang D., Li T., Ye D., and Jiang Q. An intelligent PE-malware detection system based on association mining Journal in computer virology 4 2008 323 334
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 323-334
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
-
36
-
-
56349098670
-
Pseudo nearest neighbor rule for pattern classification
-
Zeng Y., Yang Y., and Zhao L. Pseudo nearest neighbor rule for pattern classification Expert Systems with Applications 36 2009 3587 3595
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 3587-3595
-
-
Zeng, Y.1
Yang, Y.2
Zhao, L.3
-
37
-
-
84961312915
-
Hierarchical feature selection method for detection of obfuscated malicious code
-
Zhang J.F., Chen L.F., and Guo G.D. Hierarchical feature selection method for detection of obfuscated malicious code Journal of Computer Applications 32 2012 2761 2767
-
(2012)
Journal of Computer Applications
, vol.32
, pp. 2761-2767
-
-
Zhang, J.F.1
Chen, L.F.2
Guo, G.D.3
|