共 50 条
- [1] New malicious code detection based on N-gram analysis and rough set theory [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1229 - 1232
- [2] N-gram-based detection of new malicious code [J]. PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 41 - 42
- [3] Boosting feature selection in a new non-adjacent N-gram for malicious code detection [J]. Parvin, Hamid (parvin@iust.ac.ir), 1600, CRL Publishing (22):
- [5] A new N-gram feature extraction-selection method for malicious code [J]. Lect. Notes Comput. Sci., PART 2 (98-107):
- [6] A New N-gram Feature Extraction-Selection Method for Malicious Code [J]. ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, PT II, 2011, 6594 : 98 - 107
- [7] On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis [J]. PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 437 - 448
- [8] Association Analysis and N-Gram Based Detection of Incorrect Arguments [J]. Ruan Jian Xue Bao/Journal of Software, 2018, 29 (08): : 2243 - 2257
- [9] Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO), 2015, : 31 - 37
- [10] N-gram analysis for computer virus detection [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (03): : 231 - 239