共 87 条
- [1] Gantz J F, Lee R, Florean A, Et al., The link between pirated software and cybersecurity breaches, 247411, (2013)
- [2] Ye Yanfang, Li Tao, Adjeroh D, Et al., A survey on malware detection using data mining techniques, ACM Computing Surveys (CSUR), 50, 3, (2017)
- [3] Li Bo, Roundy K, Gates C, Et al., Large-scale identification of malicious singleton files, Proc of the 7th ACM on Conf on Data and Application Security and Privacy, pp. 227-238, (2017)
- [4] Schultz M G, Eskin E, Zadok F, Et al., Data mining methods for detection of new malicious executables, Proc of 2001 IEEE Symp on Security and Privacy, pp. 38-49, (2000)
- [5] Kolter J Z, Maloof M A., Learning to detect and classify malicious executables in the wild, Journal of Machine Learning Research, 7, 99, pp. 2721-2744, (2006)
- [6] Elovici Y, Shabtai A, Moskovitch R, Et al., Applying machine learning techniques for detection of malicious code in network traffic, Proc of Annual Conf on Artificial Intelligence, pp. 44-50, (2007)
- [7] Menahem E, Shabtai A, Rokach L, Et al., Improving malware detection by applying multi-inducer ensemble, Computational Statistics & Data Analysis, 53, 4, pp. 1483-1494, (2009)
- [8] Masud M M, Khan L, Thuraisingham B., A scalable multi-level feature extraction technique to detect malicious executables, Information Systems Frontiers, 10, 1, pp. 33-45, (2008)
- [9] Raff E, Zak R, Cox R, Et al., An investigation of byte n-gram features for malware classification, Journal of Computer Virology and Hacking Techniques, 14, 1, pp. 1-20, (2018)
- [10] Raff E, Barker J, Sylvester J, Et al., Malware detection by eating a whole exe, Proc of the 32nd AAAI Conf on Artificial Intelligence Workshop, pp. 2-7, (2018)