Unknown malicious codes detection based on LZW compression algorithm

被引:0
|
作者
机构
[1] Lai, Ying-Xu
[2] Liu, Hong-Nan
[3] Yang, Zhen
[4] Liu, Jing
来源
Lai, Y.-X. (laiyingxu@bjut.edu.cn) | 1600年 / Beijing University of Technology卷 / 38期
关键词
Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A hardware architecture of the real-time and lossless data compression based on LZW algorithm
    Zhang, JY
    Pei, DX
    Zhu, J
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 6753 - 6756
  • [22] Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing
    Alam, Md Ashraful
    Ahsan, Fakhrul
    Soobhee, Ateeq-Ur-Rahman
    Subhani, Mahfuze
    Hossain, F. M. Fahmid
    Islam, Md Saiful
    Ruma, Kamrun Nahar
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 272 - 275
  • [23] A New Compression Ratio Prediction Algorithm for Hardware Implementations of LZW Data Compression
    Yazdanpanah, Alireza
    Hashemi, Mahmoud Reza
    15TH CSI INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND DIGITAL SYSTEMS (CADS 2010), 2010, : 155 - 156
  • [24] Optimizing LZW Text Compression Algorithm via Multithreading Programming
    Tan, Ling Sun
    Lau, Sei Ping
    Tan, Chong Eng
    2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 592 - 596
  • [25] Machine Learning Algorithm to Detect Malicious Codes
    Khan, Simon
    Majumder, Uttam
    CYBER SENSING 2017, 2017, 10185
  • [26] Unknown Malicious Executables Detection Based on Run-time Behavior
    Hu, Yongtao
    Chen, Liang
    Xu, Ming
    Zheng, Ning
    Guo, Yanhua
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 391 - 395
  • [27] BD-LZW picture compression algorithm for WSN system
    Zhan, Jinlan
    Zhou, Qingguo
    Bai, Shuwei
    Li Cuihua
    Hu, Bin
    Li, Lian
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 146 - +
  • [28] Lossy LZW algorithm with adaptive threshold for palettized image compression
    Chiang, SW
    Po, LM
    ISSPA 96 - FOURTH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 1996, : 144 - 147
  • [29] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [30] Malicious URLs detection based on a novel optimization algorithm
    Bo W.
    Fang Z.B.
    Wei L.X.
    Cheng Z.F.
    Hua Z.X.
    IEICE Transactions on Information and Systems, 2021, E104.D (04): : 513 - 516