Malicious code detection in compound documents based on spectral analyses

被引:0
|
作者
机构
[1] [1,Liu, Lin
[2] Zhao, Xianghui
[3] Yao, Yuangang
[4] Wu, Runpu
来源
Liu, L. (liul@itsec.gov.cn) | 1713年 / Tsinghua University卷 / 53期
关键词
Complex documents - Compound document - FFT (fast Fourier transform) - Frequency domain transforms - Malicious code detection - Spectral domains - Spectral signal - Spectral transform;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [2] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
  • [3] Malicious Code Detection Based on Software Fingerprint
    Yin, Zhimin
    Yu, Xiangzhan
    Niu, Linhua
    [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
  • [4] Detection technology of malicious code based on semantic
    Qingmei Lu
    Yulin Wang
    [J]. Multimedia Tools and Applications, 2017, 76 : 19543 - 19555
  • [5] Unknown Malicious Code Detection Based on Bayesian
    Lai, Yingxu
    Liu, Zhenghui
    [J]. CEIS 2011, 2011, 15
  • [6] Design of malicious code detection system based on binar code slicin
    Zhang, Zhiyuan
    Zhang, Zhenjiang
    Li, Wei
    Zhou, Hongde
    Shen, Bo
    [J]. Journal of Computers (Taiwan), 2021, 32 (04) : 225 - 238
  • [7] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [8] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [9] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [10] Power Based Malicious Code Detection Techniques for Smartphones
    Dixon, Bryan
    Mishra, Shivakant
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 142 - 149