| 期刊論文1. | 陳嘉玫、楊佳蕙、賴谷鑫(2013)。基於結構相似度之惡意程式原始碼分類研究。電子商務學報,15(4),519-540。 延伸查詢 | 2. | Cosma, G.、Joy, M.(2012)。An approach to source-code plagiarism detection and investigation using latent semantic analysis。IEEE Transactions on Computers,61(3),379-394。 | 3. | Day, W. H.、Edelsbrunner, H.(1984)。Efficient algorithms for agglomerative hierarchical clustering methods。Journal of Classification,1(1),7-24。 | 4. | Kolter, J. Z.、Maloof, M. A.(2006)。Learning to detect and classify malicious executables in the wild。Journal of Machine Learning Research,6,2721-2744。 | 5. | Prechelt, L.、Malpohl, G.、Philippsen, M.(2002)。Finding plagiarisms among a set of programs with JPlag。Journal of Universal Computer Science,8(11),1016-1038。 | 6. | Rieck, K.、Trinius, P.、Willems, C.、Holz, T.(2011)。Automatic analysis of malware behavior using machine learning。Journal of Computer Security,19(4),639-668。 | 7. | Shankarapani, M. K.、Ramamoorthy, S.、Movva, R. S.、Mukkamala, S.(2011)。Malware detection using assembly and API call sequences。Journal in Computer Virology,7(2),107-119。 | 會議論文1. | Yu, S.、Zhou, S.、Liu, L.、Yang, R.、Luo, J.(2010)。Malware variants identification based on byte frequency。The 2nd International Conference on Network Security Wireless Communications and Trusted Computing。Wuhan。 | 2. | Zhao, H.、Xu, M.、Zheng, N.、Yao, J.、Hou, Q.(2010)。Malicious executables classification based on behavioral factor analysis。The International Conference on e-Education, e-Business, e-Management and e-Learning。Sanya。 | 3. | Alazab, M.、Layton, R.、Venkatraman, S.、Watters, P.(2010)。Malware detection based on structural and behavioral features of API calls。International Cyber Resilience Conference。Perth。 | 4. | Bailey, M.、Andersen, J.、Morleyman, Z.、Jahanian, F.(2007)。Automated classification and analysis of Internet malware。The 10th International Conference on Recent Advances in Intrusion Detection。Gold Coast。 | 5. | Firdausi, I.、Lim, C.、Erwin, A.、Nugroho, A. S.(2010)。Analysis of machine learning techniques used in behavior-based malware detection。The Second International Conference on Advances in Computing, Control, and Telecommunication Technologies。Jakarta。 | 6. | Gitchell, D.、Tran, N.(1999)。Sim: A utility for detecting similarity in computer programs。The 30th ACM Special Interest Group on Computer Science Education Technology Symposium。New Orleans, LA。 | 7. | Inoue, D.、Yoshioka, K.、Eto, M.、Hoshizawa, Y.、Nakao, K.(2008)。Malware behavior analysis in isolated miniature network for revealing malware's network activity。The IEEE International Conference on Communications。Beijing。 | 8. | Lee, T.、Mody, J. J.(2006)。Behavioral classification。The 15th European Institute for Computer Antivirus Research Conference。Hamburg。 | 9. | MacQueen, J.(1967)。Some methods for classification and analysis of multivariate observations。The Fifth Berkeley Symposium on Mathematical Statistics and Probability。California。281-297。 | 10. | Nataraj, L.、Karthikeyan, S.、Jacob, G.、Manjunath, B. S.(2011)。Malware images: Visualization and automatic classification。The 8th International Symposium on Visualization for Cyber Security。 | 11. | Nataraj, L.、Yegneswaran, V.、Porras, P.、Zhang, J.(2011)。A comparative assessment of malware classification using binary texture analysis and dynamic analysis。The 4th ACM Workshop on Security and Artificial Intelligence。Illinois。 | 12. | Rieck, K.、Holz, T.、Willems, C.、Duessel, P.、Laskov, P.(2008)。Learning and classification of malware behavior。The 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment。Paris。 | 13. | Santos, I.、Brezo, F.、Nieves, J.、Penya, Y. K.、Sanz, B.、Laorden, C.、Bringsa, P. G.(2010)。Idea: Opcode-sequence-based malware detection。The 2nd International Conference on Engineering Secure Software and Systems。Pisa。 | 14. | Tian, R.、Islam, R.、Batten, L.、Versteeg, S.(2010)。Differentiating malware from cleanware using behavioral analysis。The 5th International Conference on Malicious and Unwanted Software。Nancy。 | 15. | Tian, R.、Batten, L.、Islam, R.、Versteeg, S.(2009)。An automated classification system based on the strings of trojan and virus families。The 4th International Conference on Malicious and Unwanted Software。Quebec。 | 16. | Wang, C.、Pang, J.、Zhao, R.、Liu, X.(2009)。Using API sequence and bayes algorithm to detect suspicious behavior。International Conference on Communication Software and Networks。Sichuan。 | 圖書1. | Zhang, J.、Porras, P.、Yegneswaran, V.(2009)。Host-Rx: automated malware diagnosis based on probabilistic behavior models。California:SRI International。 | 其他1. | Conti, G.,Bratus, S.,Shubinay, A.(2010)。A visual study of primitive binary fragment types,http://www.rumit.org/gregconti/publications/taxonomy-bh.pdf。 | 2. | HP(2012)。HP Research: Cybercrime Costs Rise Nearly 40 Percent, Attack Frequency Doubles,http://www.hp.com/hpinfo/newsroom/ press/2012/121008a.html。 | 3. | Symantec(2011)。Symantec Internet Security Threat Report (ISTR),https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf。 | 4. | Trend Micro(2011)。Soldier SpyEyes a Jackpot,http://blog.trendmicro.com/trendlabs-security-inteIligence/soldier-spyeyes-a-jackpot。 | |