Signature Extraction and Detection Method of Computer Viruses Based on Immunity and Code Relocation

被引:0
|
作者
Zhang, Yu [1 ]
Liu, Qing-Zhong [2 ]
Song, Li-Ping [3 ]
Luo, Zi-Qiang [1 ]
Cao, Jun-Kuo [1 ]
机构
[1] College of Information Science and Technology, Hainan Normal University, Haikou,Hainan,571158, China
[2] Department of Computer Science, Sam Houston State University, Houston,77340, United States
[3] Key Laboratory of Information Security, Institute of Electronic Information Products Inspection of Zhejiang, Hangzhou,Zhejiang,310007, China
关键词
D O I
10.15918/j.tbit1001-0645.2017.10.009
中图分类号
学科分类号
摘要
10
引用
收藏
页码:1036 / 1042
相关论文
共 50 条
  • [1] An Immunity-inspired Relocation Method for Unknown Malware Detection
    Zhang, Yu
    Wu, Lihua
    Luo, Ziqiang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL, 2015, 20 : 75 - 78
  • [2] An Immunity based Computer Virus Detection Method with GA-RVNS
    Qin, Renchao
    Li, Tao
    Zhang, Yu
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 864 - 868
  • [3] The Unknown Computer Viruses Detection Based on Similarity
    Liu, Zhongda
    Nakaya, Naoshi
    Koui, Yuuji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 190 - 196
  • [4] Displacement detection method of QR code reference object based on computer vision
    Yang, Qiuhui
    Ji, Xiaoyu
    Liang, Yanyan
    [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 895 - 900
  • [5] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [6] A Self-Relocation based Method for Malware Detection
    Zhang, Yu
    Xia, Feng
    [J]. ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2688 - 2693
  • [7] Intelligent detection computer viruses based on multiple classifiers
    Zhang, Boyun
    Yin, Jianping
    Hao, Jingbo
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 1181 - +
  • [8] A malware signature extraction and detection method applied to mobile networks
    Hu, Guoning
    Venugopal, Deepak
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 19 - +
  • [9] Aztec Core Symbol Detection Method based on Connected Components Extraction and Contour Signature Analysis
    Martynov, S., I
    Bezmaternykh, P., V
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2019), 2020, 11433
  • [10] Feature Extraction Based on LBP in Bar Code Detection
    Yang Ruming
    Ding Meng
    Wang Jie
    Zhang Xu
    [J]. LIDAR IMAGING DETECTION AND TARGET RECOGNITION 2017, 2017, 10605