共 50 条
- [3] Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls [J]. Automatic Control and Computer Sciences, 2019, 53 : 1045 - 1055
- [4] A similarity based technique for detecting malicious executable files for computer forensics [J]. IRI 2006: PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2006, : 188 - +
- [5] Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning [J]. Automatic Control and Computer Sciences, 2022, 56 : 852 - 864
- [6] Detection of Spyware by Mining Executable Files [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 295 - 302
- [8] IDS for Detecting Malicious Non-Executable Files Using Dynamic Analysis [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
- [10] IoT-Malware Detection Based on Byte Sequences of Executable Files [J]. 2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 143 - 150