Data Mining Techniques for Malware Detection Using Signature Extraction
[Coh85] Fred Cohen. Computer Viruses. PhD thesis, University of Southern California, 1985.
[BDE99] J. Bergeron, M. Debbabi, M. M. Erhioui, and B. Ktari. “Static Analysis of Binary Code to Isolate Malicious Behavior.” In Proceedings of the 8th Workshop on Enabling
Technologies on Infrastructure for Collaborative Enterprises (WETICE’99), pp. 184–189, 1999.
[Bre01] Leo Breiman. “Random Forests.” Machine Learning, 45(1):5–32, 2001.
[Kan02] Mehmed Kantardzic. Data Mining: Concepts, Models, Methods, and Algorithms. Wiley-IEEE Press, 2002.
[SL02] Prabhat K. Singh and Arun Lakhotia. “Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography.” SIGPLAN Not., 37(2):29–35, 2002.
[IM07] Nwokedi Idika and Aditya P. Mathur. “A Survey of Malware Detection Techniques.”Technical report, Software Engineering Research Center, 2007.
[BJL08] Martin Boldt, Andreas Jacobsson, Niklas Lavesson, and Paul Davidsson. “Automated Spyware Detection Using End User License Agreements.” isa, 0:445–452, 2008.
[SWL08] Muazzam Siddiqui, Morgan C. Wang, and Joohan Lee. “Data Mining Methods for Malware Detection Using Instruction Sequences.” In Proceedings of Artificial Intelligence and Applications, AIA 2008. ACTA Press, 2008.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.