参考文献
|
-
陳嘉玫、楊佳蕙、賴谷鑫(2013)。基於結構相似度之惡意程式原始碼分類研究。電子商務學報,15(4),519-540。
連結:
-
陳嘉玫、楊佳蕙、賴谷鑫(2013)。基於結構相似度之惡意程式原始碼分類研究。電子商務學報,15(4),519-540。
連結:
-
Conti, G., Bratus, S., & Shubinay, A. (2010). A Visual Study of Primitive Binary Fragment Types. Black Hat USA
-
HP (2012). Cost of Cyber Crime Study: United States. Retrieved 2012, from http://www.hp.com/hpinfo/newsroom/press/2012/121008a.html
-
Virustotal (2015). Free Online Virus, Malware and URL Scanner. Retrieved 2015, from https://www.virustotal.com/
-
Trend Micro (2011). Press Releases: “Soldier” Uses SpyEye to Net $3.2 Million in Six Months. Retrieved 2011, from http://blog.trendmicro.com/trendlabs-security-intelligence/soldier-spyeyes-a-jackpot/
-
Alazab, M.,Layton, R.,Venkatraman, S.,Watters, P.(2010).Malware Detection Based On Structural and Behavioral Features of API Calls.Proceedings of International Cyber Resilience Conference
-
Bailey, M.,Andersen, J.,Morleyman, Z.,Jahanian, F.(2007).Automated Classification and Analysis of Internet Malware.Proceedings of the 10th International Conference on Recent advances in intrusion detection (RAID'07)
-
Cosma, G.,Joy, M.(2012).An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis. Computers.IEEE Transactions on,61(3),379-394.
-
Day, W. H.,Edelsbrunner, H.(1984).Efficient algorithms for agglomerative hierarchical clustering methods.Journal of classification,1(1),7-24.
-
Firdausi, I.,Lim, C.,Erwin, A.,Nugroho, A. S.(2010).Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection.Proceedings of 2nd International Conference on Advances in Computing, Control, and Telecommunication Technologies
-
Gitchell, D.,Tran, N.(1999).Sim: A Utility for Detecting Similarity In Computer Programs.Proceedings of the 30th SIGCSE Technical Symposium
-
Inoue,D.,Yoshioka, K.,Eto, M.,Hoshizawa, Y.,Nakao, K(2008).Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.Proceedings of the IEEE International Conference on Communications (ICC 2008)
-
Kolter, J. Z.,Maloof, M. A.(2006).Learning to Detect and Classify Malicious Executables in the Wild.Journal of Machine Learning Research,6,2721-2744.
-
Lee, T.,Mody, J. J.(2006).Behavioral_Classification.Proceedings of EICAR (European Institute for Computer Antivirus Research) Conference
-
MacQueen, J.(1967).Some methods for classification and analysis of multivariate observations.Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability
-
Nataraj, L.,Karthikeyan, S.,Jacob, G.,Manjunath, B. S.(2011).Malware images: visualization and automatic classification.Proceedings of the 8th International Symposium on Visualization for Cyber Security
-
Nataraj, L.,Yegneswaran, V.,Porras, P.,Zhang, J.(2011).A Comparative Assessment of Malware Classification Using Binary Texture Analysis and Dynamic Analysis.Proceedings of the 4th ACM workshop on Security and artificial intelligence
-
Prechelt, L.,Malpohl, G.,Philippsen, M.(2002).Finding Plagiarisms Among a Set of Programs with JPlag.Journal of Universal Computer Science,8(11),1016-1038.
-
Rieck, K.,Holz, T.,Willems, C.,Duessel, P.,Laskov, P.(2008).Learning and Classification of Malware Behavior.Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
Rieck, K.,Trinius, P.,Willems, C.,Holz, T.(2011).Automatic Analysis of Malware Behavior using Machine Learning.Journal of Computer Security,19(4),639-668.
-
Santos, I.,Brezo, F.,Nieves, J.,Penya, Y. K.,Sanz, B.,Laorden, C.,Bringsa, P. G.(2010).Idea: Opcode-sequence-based Malware Detection.Proceedings of the 2nd International Conference on Engineering Secure Software and Systems
-
Shankarapani, M. K.,Ramamoorthy, S.,Movva, R. S.,Mukkamala, S.(2011).Malware Detection Using Assembly and API Call Sequences.Journal in computer virology,7(2),107-119.
-
Symantac(2011).Symantec Internet Security Threat Report (ISTR),17
-
Tian, R.,Islam, R.,Batten, L.,Versteeg, S.(2010).Differentiating Malware from Cleanware using Behavioral Analysis.Proceedings of 5th International Conference on Malicious and Unwanted Software,23-30.
-
Tian,R.,Batten,L.,Islam, R.,Versteeg, S.(2009).An Automated Classification System Based on The Strings of Trojan and Virus Families.Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE)
-
Wang, C.,Pang, J.,Zhao, R.,Liu, X.(2009).Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior.Proceedings of International Conference on Communication Software and Networks (ICCSN)
-
Yu, S.,Zhou, S.,Liu, L.,Yang, R.,Luo, J.(2010).Malware Variants Identification Based on Byte Frequency.Proceedings of 2nd International Conference on Network Security Wireless Communications and Trusted Computing (NSWCTC)
-
Zhang, J.,Porras, P.,Yegneswaran, V(2009).,SRI International.
-
Zhao, H.,Xu, M.,Zheng, N.,Yao, J.,Hou, Q.(2010).Malicious Executables Classification Based on Behavioral Factor Analysis.Proceedings of International Conference on e-Education, e-Business, e-Management and e-Learning
|