共 50 条
- [1] Malware Obfuscation Measuring via Evolutionary Similarity [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
- [2] Detecting and classifying method based on similarity matching of Android malware behavior with profile [J]. SPRINGERPLUS, 2016, 5
- [3] Variant: A Malware Similarity Testing Framework [J]. 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 31 - 39
- [5] Evolved Similarity Techniques in Malware Analysis [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 404 - 409
- [6] Detecting Malware with Similarity to Android applications [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1249 - 1251
- [7] A Probabilistic Approach to Measuring Driving Behavior Similarity With Driving Primitives [J]. IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2020, 5 (01): : 127 - 138
- [8] Malware Behavior Image for Malware Variant Identification [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 238 - 243
- [9] Malware Detection Method Based on Subgraph Similarity [J]. Wang, Jie (jwang@csu.edu.cn), 1600, Chinese Academy of Sciences (31): : 3436 - 3447
- [10] Dynamic Malware Detection using API Similarity [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 297 - 301