[1] |
卡巴斯基年报[EB/OL]. .
|
|
Kabasiji annual report[EB/OL]. .
|
[2] |
赛门铁克年报[EB/OL]. .
|
|
Symantec annual report[EB/OL]. .
|
[3] |
SCHULTZ M G , ESKIN E , ZADOK E , et al. Data mining methods for detection of new malicious executables[C]// 2001 IEEE Sympo-sium on Security and Privacy(S&P 2001), 2001: 38-49.
|
[4] |
MEHDI B , AHMED F , KHAYYAM S A , et al. Towards a Theory of Generalizing System Call Representation for In-Execution Mal-ware Detection[C]// IEEE International Conference on Communica-tions, 2010: 1-4.
|
[5] |
PARK Y , REEVES D , MULUKUTLA V , et al. Fast malware classi-fication by automated behavioral graph matching[C]// AMIA Annu Symp Proc, 2010: 1-4.
|
[6] |
SANTOS I , BREZO F , UGARTE-PEDRERO X , et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection[J]. Information Sciences, 2013,231(9): 64-82.
|
[7] |
GRINI L S , SHALAGINOV A , FRANKE K . Study of soft compu-ting methods for large-scale multinomial malware types and fami-lies de-tection[C]// The World Conference on Soft Computing, 2016.
|
[8] |
RIECK K , HOLZ T , WILLEMS C , et al. Learning and classifica-tion of malware behavior[C]// The International Conference on Detection of Intrusions & Malware, 2008: 108-125.
|
[9] |
SALEHI Z , SAMI A , GHIASI M . Using feature generation from API calls for malware detection[J]. Computer Fraud & Security, 2014,2014(9): 9-18.
|
[10] |
KOLOSNJAJI B , ZARRAS A , WEBSTER G , et al. Deep learning for classi-fication of malware system call sequences[M]// AI 2016:Advances in Artificial Intelligence. Berlin: Springer, 2016.
|
[11] |
韩晓光, 曲武, 姚宣霞 , 等. 基于纹理指纹的恶意代码变种检测方法研究[J]. 通信学报, 2014,35(8): 125-136.
|
|
HAN X G , QU W , YAO X X , et al. Research on malicious code variants detection based on texture fingerprint[J]. Journal on Communications. 2014,35(8): 125-136.
|
[12] |
Digital bread crumbs:seven clues to identifying who's behind advanced cyber attacks[EB/OL]. .
|
[13] |
IDA pro website[EB/OL]. .
|
[14] |
PE Exeinfo website[EB/OL]. .
|
[15] |
Mastiff website[EB/OL]. .
|
[16] |
Yara-rules website[EB/OL]. .
|
[17] |
Top maliciously used APIs[EB/OL]. .
|
[18] |
Scikit-learn website[EB/OL]. .
|
[19] |
VirusShare website[EB/OL]. .
|
[20] |
Naming scheme-caro-computer antivirus research organization[EB/OL]. .
|
[21] |
Free online virus,malware and url scanner[EB/OL]. .
|