:::

詳目顯示

回上一頁
題名:基於結構相似度之惡意程式原始碼分類研究
書刊名:電子商務學報
作者:陳嘉玫 引用關係楊佳蕙賴谷鑫 引用關係
作者(外文):Chen, Chia-meiYang, Chia-huiLai, Gu-hsin
出版日期:2013
卷期:15:4
頁次:頁519-539
主題關鍵詞:惡意軟體分類靜態分析結構相似度Malware classificationStatic analysisStructure similarity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:36
期刊論文
1.Altaher, A.、Supriyanto、ALmomani, A.、Anbar, M.、Ramadass, S.(2012)。Malware detection based on evolving clustering method for classification。Scientific Research and Essays,7(22),2031-2036。  new window
2.Damerau, F. J.(1964)。A technique for computer detection and correction of spelling errors。Communications of the ACM,7(3),171-176。  new window
3.Hamming, R. W.(1950)。Error detecting and error correcting codes。Bell System Technical Journal,29(2),147-160。  new window
4.Kolter, J. Z.、Maloof, M. A.(2006)。Learning to detect and classify malicious executables in the wild。Journal of Machine Learning Research,7,2721-2744。  new window
5.Willems, C.、Holz, T.、Freiling, F.(2007)。Toward automated dynamic malware analysis using CWSandbox。IEEE Security and Privacy,2(5),32-39。  new window
6.Ye, Y.、Chen, L.、Wang, D.、Li, T.、Jiang, Q.、Zhao, M.(2009)。SBMDS: An interpretable string based malware detection system using SVM ensemble with bagging。Journal in Computer Virology,5(4),283-293。  new window
7.Ye, Y.、Li, T.、Huang, K.、Jiang, Q.、Chen, Y.(2010)。Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list。Journal of Intelligent Information Systems,35(1),1-20。  new window
8.Ye, Y.、Wang, D.、Li, T.、Ye, D.、Jiang, Q.(2008)。An intelligent PE-malware detection system based on association mining。Journal in Computer Virology,4(4),323-334。  new window
9.Levenshtein, V. I.(1966)。Binary codes capable of correcting deletions, insertions and reversals。Soviet Physics Doklady,10(8),707-710。  new window
會議論文
1.Cesare, S.、Xiang, Y.(2010)。Classification of malware using structured control flow。Brisbane, Australia。  new window
2.Christodorescu, M.、Jha, S.(2003)。Static analysis of executables to detect malicious patterns。Washington, D.C., USA。  new window
3.Gheorghescu, M.(2005)。An automated virus classification system。Virus Bulletin Conference。Dublin, Ireland。  new window
4.Maletic, J. I.、Valluri, N.(1999)。Automatic software clustering via Latent Semantic Analysis。Florida, USA。  new window
5.Winkler, W. E.(1990)。String comparator metrics and enhanced decision rules in the fellegi-sunter model of record linkage。USA:American Statistical Association。  new window
6.Zen, K.、Iskandar, D. N. F. A.、Linang, O.(2011)。Using Latent Semantic Analysis for automated grading programming assignments。Putrajaya, Malaysia。  new window
7.Bergroth, L.、Hakonen, H.、Raita, T.(2000)。A survey of longest common subsequence algorithms。Seventh International Symposium on String Processing and Information Retrieval (SPIRE 2000)。A Curuña, Spain。39-48。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE