References
- Grimes, R. Malicious mobile code: Virus protection for Windows. " O'Reilly Media, Inc.", 2001.
- Biggio, B., Nelson, B., Laskov, P., "Poisoning attacks against support vector machines," in Proc. of Langford, J., Pineau, J., editors, 29th International Conference on Machine Learning (ICML), pp. 1467-1474, June 26-July 01, 2012.
- Elhadi, E., Maarof, M. A., Barry, B., "Improving the detection of malware behaviour using simplified data dependent api call graph," International Journal of Security and Its Applications, Vol. 7, No. 5, pp. 29-42, October, 2013. https://doi.org/10.14257/ijsia.2013.7.5.03
- Saxe, J., Berlin, K., "Deep neural network based malware detection using two dimensional binary program features," in Proc. of 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 11-20, October, 2015.
- Fan, C. I., Hsiao, H. W., Chou, C. H., Tseng, Y. F., "Malware detection systems based on API log data mining," in Proc. of 2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), Vol. 3, pp. 255-260, July, 2015.
- Maiorca, D., "Design and implementation of robust systems for secure malware detection (Doctoral dissertation, Universita'degli Studi di Cagliari)," 2016.
- Ye, Y., Wu, L., Hong, Z., and Huang, K., "A Risk Classification Based Approach for Android Malware Detection," KSII Transactions on Internet and Information Systems, vol. 11, no. 2, pp. 959-981, February, 2017. https://doi.org/10.3837/tiis.2017.02.018
- Abdulla, S. and Altaher, A., "Intelligent Approach for Android Malware Detection," KSII Transactions on Internet and Information Systems, vol. 9, no. 8, pp. 2964-2983, August, 2015. https://doi.org/10.3837/tiis.2015.08.012
- Xiao, X., Wang, Z., Li, Q., Li, Q., and Jiang, Y., "ANNs on Co-occurrence Matrices for Mobile Malware Detection," KSII Transactions on Internet and Information Systems, vol. 9, no. 7, pp. 2736-2754, July, 2015. https://doi.org/10.3837/tiis.2015.07.023
- Schultz, M. G., Eskin, E., Zadok, F., Stolfo, S. J., "Data mining methods for detection of new malicious executables," in Proc. of Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 38-49, May, 2001.
- Frederick, R., "Core concept: homomorphic encryption," in Proc. of Proceedings of the National Academy of Sciences, Vol.112, no. 28, pp. 8515-8516, July, 2015. https://doi.org/10.1073/pnas.1507452112
- Sun, Y., Wen, Q., Zhang, Y., Zhang, H., Jin, Z., "Efficient secure multiparty computation protocol for sequencing problem over insecure channel," Mathematical Problems in Engineering 2013, Article ID 172718, September, 2013.
- Eskandari, M., Khorshidpur, Z., Hashemi, S., "To incorporate sequential dynamic features in malware detection engines," in Proc. of Intelligence and Security Informatics Conference (EISIC), pp. 46-52, August, 2012.
- Ye, Y., Wang, D., Li, T., Ye, D., "IMDS: Intelligent malware detection system," in Proc. of Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1043-1047, August, 2007.
- Canfora, G., Di Sorbo, A., Mercaldo, F., Visaggio, C. A., "Obfuscation techniques against signature-based detection: a case study," in Proc. of Proceedings of 1st Workshop on Mobile System Technologies (MST), pp. 21-26, May, 2015.
- Kim, M., Lauter, K., "Private genome analysis through homomorphic encryption," BMC medical informatics and decision making, Vol. 15, no. 5, S3, 2015.
- Elhadi, A. A. E., Maarof, M. A., Barry, B. I., Hamza, H., "Enhancing the detection of metamorphic malware using call graphs," Computers & Security, Vol. 46, pp. 62-78, October, 2014. https://doi.org/10.1016/j.cose.2014.07.004
- Kocabas, O., Soyata, T., "Utilizing homomorphic encryption to implement secure and private medical cloud computing," in Proc. of Cloud Computing (CLOUD), 2015 IEEE 8th International Conference, pp. 540-547, June, 2015.
- Sun, Y., Wen, Q., Zhang, Y., Li, W., "Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks," Computational and mathematical methods in medicine, vol. 2014, pp. 9, July, 2014.
- Kim, M., Lauter, K., "Private genome analysis through homomorphic encryption," BMC Med Inform Decis Making, 15(Suppl 5):3, December, 2015. https://doi.org/10.1186/s12911-014-0124-4
- Yi, X., Okamoto, E., "Practical internet voting system," Journal of Network and Computer Applications, Vol. 36, no. 1, pp. 378-387, January, 2013. https://doi.org/10.1016/j.jnca.2012.05.005
- Bunn, P., Ostrovsky, R., "Secure two-party k-means clustering," in Proc. of Proceedings of the 14th ACM conference on Computer and communications security, pp. 486-497, October, 2007.
- Fun, T. S. and Samsudin, A., "A Survey of Homomorphic Encryption for Outsourced Big Data Computation," KSII Transactions on Internet and Information Systems, vol. 10, no. 8, pp. 3826-3851, August, 2016. https://doi.org/10.3837/tiis.2016.08.022
- Kissner, L., Song, D., "Privacy-preserving set operations," in Proc. of Annual International Cryptology Conference, Springer Berlin Heidelberg, pp. 241-257, August, 2005.
- Xuezhen, H., Jiqiang, L., Zhen, H., Jun, Y., "A new anonymity model for privacy-preserving data publishing," China Communications, Vol. 11, no. 9, pp. 47-59, November, 2014. https://doi.org/10.1109/CC.2014.6969710
- Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A. R., Schneider, T., "Secure evaluation of private linear branching programs with medical applications," in Proc. of European Symposium on Research in Computer Security, pp. 424-439, September, 2009.
- Barni, M., Failla, P., Lazzeretti, R., Paus, A., Sadeghi, A. R., Schneider, T., Kolesnikov, V., "Efficient privacy-preserving classification of ECG signals," in Proc. of First IEEE International Workshop on #Information Forensics and Security, pp. 91-95, December, 2009.
- Bos, J. W., Lauter, K., Naehrig, M., "Private predictive analysis on encrypted medical data," Journal of biomedical informatics, Vol. 50, pp. 234-243, August, 2014. https://doi.org/10.1016/j.jbi.2014.04.003
- Bost, R., Popa, R. A., Tu, S., Goldwasser, S., "Machine Learning Classification over Encrypted Data," in Proc. of The 22nd Internet Society Annual Network and Distributed System Security Symposium, pp. 8-11, February, 2015.
- Paillier, P., "Public-key cryptosystems based on composite degree residuosity classes," in Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223-238, May, 1999.
- Lee, T., Choi, B., Shin, Y., Kwak, J., "Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient," The Journal of Supercomputing, pp. 1-15, December, 2015.
- Tschiatschek, S., Pernkopf, F., "On Bayesian network classifiers with reduced precision parameters," IEEE transactions on pattern analysis and machine intelligence, Vol. 37, no. 4, pp. 774-785, August, 2015. https://doi.org/10.1109/TPAMI.2014.2353620
- X. Yi, R. Paulet, E., "Bertino. homomorphic Encryption and Applications," Springer International Publishing, 2014.
- Zhang, Y., Wang, S., Phillips, P., Ji, G., "Binary PSO with mutation operator for feature selection using decision tree applied to spam detection," Knowledge-Based Systems, Vol. 64, pp. 22-31, July, 2014.
Cited by
- Malware Detection Based on Deep Learning of Behavior Graphs vol.2019, pp.None, 2018, https://doi.org/10.1155/2019/8195395
- A Novel Malware Classification Method Based on Crucial Behavior vol.2020, pp.None, 2018, https://doi.org/10.1155/2020/6804290