[1] |
刘剑, 苏璞睿, 杨珉 ,等. 软件与网络安全研究综述[J]. 软件学报, 2018(1): 42-68.
|
|
LIU J , SU P R , YANG M ,et al. Software and cyber security—a survey[J]. Journal of Software, 2018(1): 42-68.
|
[2] |
SONG F , TOUILI T . Efficient malware detection using model-checking[C]// FM:Formal Methods. 2012: 418-433.
|
[3] |
YIN H , SONG D . Privacy-breaching behavior analysis[M]. Automatic Malware Analysis. 2013: 27-42.
|
[4] |
TODERICI A H , STAMP M . Chi-squared distance and metamorphic virus detection[J]. Journal in Computer Virology, 2013,9(1): 1-14.
|
[5] |
EGELE M , SCHOLTE T , KIRDA E ,et al. A survey on automated dynamic malware-analysis techniques and tools[J]. ACM Computing Surveys, 2008,44(2): 1-42.
|
[6] |
陈志锋, 李清宝, 张平 ,等. 基于聚类分析的内核恶意软件特征选择[J]. 电子与信息学报, 2015,37(12): 2821-2829.
|
|
CHEN Z F , LI Q B , ZHANG P ,et al. Signature selection for kernel malware based on cluster analysis[J]. Journal of Electronics & Information Technology, 2015,37(12): 2821-2829.
|
[7] |
李珍, 田俊峰, 杨晓晖 . 基于系统调用属性的程序行为监控[J]. 计算机研究与发展, 2012,49(8): 1676-1684.
|
|
LI Z , TIAN J F , YANG X H . Program behavior monitoring based on system call attributes[J]. Journal of Computer Research and Development, 2012,49(8): 1676-1684.
|
[8] |
田新广, 段洣毅, 程学旗 . 基于 shell 命令和多重行为模式挖掘的用户伪装攻击检测[J]. 计算机学报, 2010,33(4): 697-705.
|
|
TIAN X G , DUAN M Y , CHENG X Q . Masquerade detection based on shell commands and multiple behavior pattern mining[J]. Chinese Journal of Computers, 2010,33(4): 697-705.
|
[9] |
陈志锋, 李清宝, 张平 ,等. 基于数据特征的内核恶意软件检测[J]. 软件学报, 2016,27(12): 3172-3191.
|
|
CHEN Z F , LI Q B , ZHANG P ,et al. Data characteristics-based kernel malware detection[J]. Journal of Software, 2016,27(12): 3172-3191.
|
[10] |
GREENGARD S . Cyber security gets smart[J]. Communications of the ACM, 2016,59(5): 29-31
|
[11] |
SADEGHI A , BAGHERI H , GARCIA J . A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software[J]. IEEE Transactions on Software Engineering, 2016.
|
[12] |
杨雅辉, 黄海珍, 沈晴霓 ,等. 基于增量式GHSOM神经网络模型的入侵检测研究[J]. 计算机学报, 2014(5): 1216-1224.
|
|
YANG Y H , HUANG H Z , SHEN Q N ,et al. Research on intrusion detection based on incremental GHSOM[J]. Chinese Journal of Computers, 2014(5): 1216-1224.
|
[13] |
邱天宇, 申富饶, 赵金熙 . 自组织增量学习神经网络综述[J]. 软件学报, 2016,27(9): 2230-2247.
|
|
QIU T Y , SHEN F R , ZHAO J X . Review of self-organizing incremental neural network[J]. Journal of Software, 2016,27(9): 2230-2247.
|
[14] |
LEE D D , SEUNG H S . Learning the parts of objects by non-negative matrix factorization[J]. Nature, 1999,401(6755): 788-791.
|
[15] |
WANG W , ZHANG X , GOMBAULT S ,et al. Attribute normalization in network intrusion detection[C]// International Symposium on Pervasive Systems,Algorithms,and Networks. 2010: 448-453.
|