1 |
V. Keselj, F. Peng, N. Cercone, and C. Thomas, 'N-gram-based Author Profiles for Authorship Attribution.', Proceedings of the Conference Pacific Association or Computational Linguistics, (PACLING'03), 2003
|
2 |
Kolter, J.Z., and Maloof, M. A., 'Learning to detect malicious executables in the wild', In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 470-478. New York, NY, 2004
DOI
|
3 |
Jian Yu and Miin-Shen Yang, 'Optimality Test for Generalized FCM and Its Application to Parameter Selection', IEEE Transactions on Fuzzy Systems, Vol. 13, No.1, Feb. 2005
DOI
ScienceOn
|
4 |
G. McGraw and G. Morisett, 'Attacking malicious code: A report to the Infosec Research Council.', IEEE Software, pp.33-41, September/October 2000
|
5 |
Abou-Assaleh, Nick Cercone, Vlado Keselj, and Ray Sweidan, 'Detection of New Malicious Code Using N-grams Signatures, Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04), pp. 193-196, 2004
|
6 |
http://www.datarescue.com
|
7 |
VX Heaven: http://vx.netlux.org
|
8 |
UCF Data Mining Research Group : http://www.eecs.ucf.edu/~jlee/dm
|
9 |
Abou-Assaleh, Nick Cercone, Vlado Keselj, and Ray Sweidan, 'N-Gram based Detection of New Malicious Code', Proceeding of the 28th Annual International Computer Software and Applications Conference(COMPSAC'04), 2004
|
10 |
Jianyong Dai, Joohan Lee and Morgan C. Wang, 'Detecting Unknown Computer Virus Using Data Mining Techniques', Business Intelligent Symposium, poster presentation, April, 2006
|
11 |
I. Witten and E. Frank, 'Data mining: Practical machine learning tools and techniques with java implementations', Morgan Kaufmann, San francisco, CA, 2000
|
12 |
J. C. Bezdek, 'Pattern Recognition with Fuzzy Objective Function Algorithms', Plenum press, New York, 1981
|
13 |
J. O. Kephart and W.C. Arnold, 'Automatic Extraction of Computer Virus Signatures.', Proceedings of the 4th Virus Bulletin International Conference, R. Ford, ed., Virus Bulletin Ltd., Abingdon, England, pp. 178-184, 1994
|
14 |
J. O. Kephart, 'A Biologically Inspired Immune System for Computers.', Proceedings of the 4th Workshop on Synthesis and Simulation of Living Systems, pp.130-139, 1994
|
15 |
Mathew Braverman, 'Windows Malicious Software Removal Tool : Progress Made, Trends Observed', Microsoft Antimalware Team, 2006
|