[1]
孔德光, 谭小彬, 奚宏生, 等. 提升多维特征检测迷惑恶意代码[J]. 软件学报, 2010, 22(3): 522-533.
[2]
MAIRH A, BARIK D, VERMA K, et al.Honeypot in network security: a survey[C] // Proceedings of the 2011 ACM International Conference on Communication. New York: ACM Press, 2011:600-605.
[3]
Rinsing. Safty Reports[EB/OL]. [2011-07-20]. http://www.rising.com.cn/about/news/rising/2011-07-20/9802.html.
[4]
王蕊, 苏璞睿, 杨轶, 等. 一种抗混淆的恶意代码变种识别系统[J]. 电子学报, 2011, 39(10): 2322-2331.
[5]
YE Y, CHEN L, LI T, et al. An interpretable string based malware detection system using SVM ensemble with bagging[J]. Journal of Computer Virology, 2009, 5(4):283-293.
[6]
金然, 魏强, 王清贤. 针对等价指令替换变形的归一化研究[J]. JOCA, 2008, 28(3): 629-632.
[7]
李伟, 苏璞睿. 基于内核驱动的恶意代码动态检测技术[J]. 中国科学院研究生院学报, 2010, 27(5): 695-703.
[8]
F-Secure.Virus and threats[EB/OL]. [2011-05-25]. http://www.f-secure.com/v-descs/cih.shtml.
[9]
Datarescue. IDA Pro[EB/OL]. [2011-03-10]. http://www.datarescue.com.
[10]
ABOU-ASSALEH T, CERCONE N, KESELJ V, et al. N-gram-based detection of new malicious code[C] // COMPSAC04: Proceedings of the 28th Annual International Computer Software and Applications Conference. Washington, DC: IEEE Computer Society, 2004: 41-42.
[11]
张小康, 帅建梅, 史林. 基于加权信息增益的恶意代码检测方法[J]. 计算机工程, 2010, 36(6): 149-151.
[12]
KEPHART J O, ARNOLD W C. Automatic extraction of computer virus signatures[C] // Proceedings of the 4th Virus Bulletin International Conference. Berlin: Springer-Verlag, 1994: 178-184.
[13]
SCHULTZ M G, ESKIN E, ZADOK E, et al.Data mining methods for detection of new malicious executables[C] // Proceedings of the IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2001: 38-49.
[14]
KOLTER J Z, MALOOF M A. Learning to detect and classify malicious executables in the wild[J]. Journal of Machine Learning Research, 2006,7: 2721-2744.
[15]
LEE J, JEONG K, LEE H. Detecting metamorphic malwares using code graphs[C] // Proceedings of the 25th ACM Symposium on Applied Computing. New York: ACM Press, 2010: 1970-1977.
[16]
左黎明, 刘二根, 徐宝根, 等. 恶意代码族群特征提取与分析技术[J]. 华中科技大学学报:自然科学版, 2010, 38(4): 46-49.
[17]
TESAURO G, KEPHART J O, SORKIN G B. Neural networks for computer virus recognition[J]. IEEE Expert, 1996, 11(4): 5-6.
[18]
Securityfocus. Symantec threatCon[EB/OL]. [2011-05-25]. http://www.securityfocus.com/brief/485.
[19]
F-Secure. Virus and threats[EB/OL]. [2011-05-13]. http://www.f-secure.com/v-descs/bagle_ge.shtml.
[20]
DENG P S, WANG J, SHIEH W, et al. Intelligent automatic malicious code signatures extraction[C] // Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology. Washington, DC: IEEE Computer Society, 2003: 600-603.
[21]
WANG WEI, ZHANG PENG-TAO, TAN YIN, et al.. An immune local concentration based virus detection approach[J]. Journal of Zhejiang University: Science C, 2011, 12(6): 443-454.
[22]
PASCAL S. Beyond TFIDF weighting for text categorization in the vector space model[C] // IJCAI2005: Proceedings of the 19th International Joint Conference on Artificial Intelligence. San Francisco: Morgan Kaufmann Publishers, 2005:1130-1135.
[23]
AGRAWAL R, IMIELINSKI T, SWAMI A. Mining association rules between sets of items in large databases[C] // Proceedings of ACM SIGMOD Conference Management of Data. Washington, DC: IEEE Computer Society, 1993: 207-216.
[24]
Netlux. Malicious code samples[DB/OL]. [2011-04-26]. http://vx.netlux.org/.
[25]
Offensive Computing. Malicious code samples[DB/OL]. [2011-04-26]. http://www.offensivecomputing.net/.
[26]
HENCHIRI O, JAPKOWICZ N. A feature selection and evalutation scheme for computer virus detection[C] // ICDM06: Proceedings of the 6th International Conference on Data Mining. Washington, DC: IEEE Computer Society, 2006: 891-895.
[27]
郭宁, 孙晓妍, 林和, 等. 基于属性序约简的恶意代码检测[J]. JOCA, 2011, 31(4): 1006-1009. |