References
- Jeffrey O. Kephart and William C. Arnold, “Automatic Extraction of Computer Virus Signatures,” 4th Virus Bulletin International Conference, Jersey, USA, 1994, pp.178-184.
- Matthew G. Schultz, Eleazar Eskin, Erez Zadok and Salvatore J. Stolfo, “Data Mining Methods for Detection of New Malicious Executables,” IEEE Symposium on security and privacy, 2001, pp.38-49.
- Jeremy Z. Kolter and Marcus A. Maloof, “Learning to Detect Malicious Executables in the Wild,” Proceedings of the tenth ACM SIGKDD international conference, 2004, pp.2721-2744.
- David Wagner and Drew Dean, “Intrusion Detection via Static Analysis,” Proceedings of the IEEE Symposium on Security and Privacy, 2001, pp.156-168.
- J-Y. Xu, A. H. Sung, P. Chavez and S. Mukkamala, “Polymorphic Malicious Executable Scanner by API Sequence Analysis,” Proceedings of the Fourth International Conference on Hybrid Intelligent Systems, 2004, pp.378-383.
- J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y. Lavoie and N. TawbiStatic, “Detection of Malicious Code in Executable Programs,” Int. J. of Req. Eng., 2001, pp.45-48.
- XU Ming, CHEN Chun and YING Jing, “Anomaly Detection Based on System Call Classification,” Journal of Software, Vol.15, No.3, 2004, pp.391-403.
- Elizabeth Stinson and John C. Mitchell, “Characterizing Bots’ Remote Control Behavior. In Detection of Intrusions & Malware, and Vulnerability Assessment,” 2007, pp.89-108.
- Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh, “Computer Virus Strategies and Detection Methods,” Int. J. Open Problems Compt. Math., Vol.1, No.2, 2008, pp.12-20.
- F. Cohen, “Computer viruses:: Theory and experiments,” Computers & security, Vol.6, 1987, pp.22-33. https://doi.org/10.1016/0167-4048(87)90122-2
Cited by
- Unified threat model for analyzing and evaluating software threats 2014, https://doi.org/10.1002/sec.599
- Simple and effective method for detecting abnormal internet behaviors of mobile devices vol.321, 2015, https://doi.org/10.1016/j.ins.2015.04.035
- Digital forensics investigation methodology applicable for social network services vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-014-2061-8