:::

詳目顯示

回上一頁
題名:基於漸增式分群法之惡意程式自動分類研究
書刊名:電子商務學報
作者:陳嘉玫 引用關係賴谷鑫 引用關係
作者(外文):Chen, Chia-meiLai, Gu-hsin
出版日期:2016
卷期:18:2
頁次:頁225-247
主題關鍵詞:誘捕系統惡意程式分類靜態分析漸增式分群HoneypotClassification of malwareStatic analysisIncremental clustering
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:5
期刊論文
1.陳嘉玫、楊佳蕙、賴谷鑫(2013)。基於結構相似度之惡意程式原始碼分類研究。電子商務學報,15(4),519-540。new window  延伸查詢new window
2.Cosma, G.、Joy, M.(2012)。An approach to source-code plagiarism detection and investigation using latent semantic analysis。IEEE Transactions on Computers,61(3),379-394。  new window
3.Day, W. H.、Edelsbrunner, H.(1984)。Efficient algorithms for agglomerative hierarchical clustering methods。Journal of Classification,1(1),7-24。  new window
4.Kolter, J. Z.、Maloof, M. A.(2006)。Learning to detect and classify malicious executables in the wild。Journal of Machine Learning Research,6,2721-2744。  new window
5.Prechelt, L.、Malpohl, G.、Philippsen, M.(2002)。Finding plagiarisms among a set of programs with JPlag。Journal of Universal Computer Science,8(11),1016-1038。  new window
6.Rieck, K.、Trinius, P.、Willems, C.、Holz, T.(2011)。Automatic analysis of malware behavior using machine learning。Journal of Computer Security,19(4),639-668。  new window
7.Shankarapani, M. K.、Ramamoorthy, S.、Movva, R. S.、Mukkamala, S.(2011)。Malware detection using assembly and API call sequences。Journal in Computer Virology,7(2),107-119。  new window
會議論文
1.Yu, S.、Zhou, S.、Liu, L.、Yang, R.、Luo, J.(2010)。Malware variants identification based on byte frequency。The 2nd International Conference on Network Security Wireless Communications and Trusted Computing。Wuhan。  new window
2.Zhao, H.、Xu, M.、Zheng, N.、Yao, J.、Hou, Q.(2010)。Malicious executables classification based on behavioral factor analysis。The International Conference on e-Education, e-Business, e-Management and e-Learning。Sanya。  new window
3.Alazab, M.、Layton, R.、Venkatraman, S.、Watters, P.(2010)。Malware detection based on structural and behavioral features of API calls。International Cyber Resilience Conference。Perth。  new window
4.Bailey, M.、Andersen, J.、Morleyman, Z.、Jahanian, F.(2007)。Automated classification and analysis of Internet malware。The 10th International Conference on Recent Advances in Intrusion Detection。Gold Coast。  new window
5.Firdausi, I.、Lim, C.、Erwin, A.、Nugroho, A. S.(2010)。Analysis of machine learning techniques used in behavior-based malware detection。The Second International Conference on Advances in Computing, Control, and Telecommunication Technologies。Jakarta。  new window
6.Gitchell, D.、Tran, N.(1999)。Sim: A utility for detecting similarity in computer programs。The 30th ACM Special Interest Group on Computer Science Education Technology Symposium。New Orleans, LA。  new window
7.Inoue, D.、Yoshioka, K.、Eto, M.、Hoshizawa, Y.、Nakao, K.(2008)。Malware behavior analysis in isolated miniature network for revealing malware's network activity。The IEEE International Conference on Communications。Beijing。  new window
8.Lee, T.、Mody, J. J.(2006)。Behavioral classification。The 15th European Institute for Computer Antivirus Research Conference。Hamburg。  new window
9.MacQueen, J.(1967)。Some methods for classification and analysis of multivariate observations。The Fifth Berkeley Symposium on Mathematical Statistics and Probability。California。281-297。  new window
10.Nataraj, L.、Karthikeyan, S.、Jacob, G.、Manjunath, B. S.(2011)。Malware images: Visualization and automatic classification。The 8th International Symposium on Visualization for Cyber Security。  new window
11.Nataraj, L.、Yegneswaran, V.、Porras, P.、Zhang, J.(2011)。A comparative assessment of malware classification using binary texture analysis and dynamic analysis。The 4th ACM Workshop on Security and Artificial Intelligence。Illinois。  new window
12.Rieck, K.、Holz, T.、Willems, C.、Duessel, P.、Laskov, P.(2008)。Learning and classification of malware behavior。The 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment。Paris。  new window
13.Santos, I.、Brezo, F.、Nieves, J.、Penya, Y. K.、Sanz, B.、Laorden, C.、Bringsa, P. G.(2010)。Idea: Opcode-sequence-based malware detection。The 2nd International Conference on Engineering Secure Software and Systems。Pisa。  new window
14.Tian, R.、Islam, R.、Batten, L.、Versteeg, S.(2010)。Differentiating malware from cleanware using behavioral analysis。The 5th International Conference on Malicious and Unwanted Software。Nancy。  new window
15.Tian, R.、Batten, L.、Islam, R.、Versteeg, S.(2009)。An automated classification system based on the strings of trojan and virus families。The 4th International Conference on Malicious and Unwanted Software。Quebec。  new window
16.Wang, C.、Pang, J.、Zhao, R.、Liu, X.(2009)。Using API sequence and bayes algorithm to detect suspicious behavior。International Conference on Communication Software and Networks。Sichuan。  new window
圖書
1.Zhang, J.、Porras, P.、Yegneswaran, V.(2009)。Host-Rx: automated malware diagnosis based on probabilistic behavior models。California:SRI International。  new window
其他
1.Conti, G.,Bratus, S.,Shubinay, A.(2010)。A visual study of primitive binary fragment types,http://www.rumit.org/gregconti/publications/taxonomy-bh.pdf。  new window
2.HP(2012)。HP Research: Cybercrime Costs Rise Nearly 40 Percent, Attack Frequency Doubles,http://www.hp.com/hpinfo/newsroom/ press/2012/121008a.html。  new window
3.Symantec(2011)。Symantec Internet Security Threat Report (ISTR),https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf。  new window
4.Trend Micro(2011)。Soldier SpyEyes a Jackpot,http://blog.trendmicro.com/trendlabs-security-inteIligence/soldier-spyeyes-a-jackpot。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE