Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 338-341.doi: 10.11896/j.issn.1002-137X.2017.11A.071
Previous Articles Next Articles
YANG Yan and JIANG Guo-ping
[1] YEGNESWARAN V,GIFFIN J T,BARFOD P,et al.An archi-tecture for generating semantics-aware signatures[C]∥Con-ference on Usenix Security Symposium.USENIX Association,2004:7-7. [2] LEE H,KIM W,HONG M.Biologically Inspired Computer Virus Detection System[J].Lecture Notes in Computer Science,2004,3141:153-165. [3] KIJEWSKI P.Automated Extraction of Threat Signatures from Network Flows.http://www.first.org/conference/2006/papers/kijewski-piotr-paper.pdf. [4] KREIBICH C,ROWCROFT J.Honeycomb:creating intrusion detection signatures using honeypots[J].Acm Sigcomm Computer Communication Review,2015,34(1):51-56. [5] 张小康,帅建梅,史林.基于加权信息增益的恶意代码检测方法[J].计算机工程,2010,36(6):149-151. [6] KEPHART J O,ARNOLD W C.Automatic extraction of computer virus signatures[C]∥4th Virus Bulletin International Conference.1994. [7] 张福勇.基于n-gram词频的恶意代码特征提取方法[J].网络安全技术与应用,2015(11):88-89. [8] 白金荣,王俊峰,赵宗渠.基于PE静态结构特征的恶意软件检测方法[J].计算机科学,2013,40(1):122-126. [9] RAFF E,ZAK R,COX R,et al.An investigation of byte n-gram features for malware classification[J].Journal of Computer Virology & Hacking Techniques,2016:1-20. [10] 曾键,赵辉.一种基于N-Gram的计算机病毒特征码自动提取方法[J].计算机安全,2013(10):2-5. [11] 李沁蕾,王蕊,贾晓启.OSN中基于分类器和改进n-gram模型的跨站脚本检测方法[J].计算机应用,2014,34(6):1661-1665. [12] DHAYA R,POONGODI M.Detecting software vulnerabilies in android using static analysis[C]∥International Conference on Advanced Communication,Control and Computing Technologies.2014. [13] O’KANE P,SEZER S,MCLAUGHLIN K.N-gram densitybased malware detection[C]∥Computer Applications & Research.IEEE,2014:1-6. [14] SHABTAI A,MOSKOVITCH R,FEHER C,et al.Detectingunknown malicious code by applying classification techniques on OpCode patterns[J].Security Informatics,2012,1(1):1-22. [15] SANTOS I,BREZO F,UGARTE-PEDRERO X,et al.Opcode sequences as representation of executables for data-mining-based unknown malware detection[J].Information Sciences,2013,231(9):64-82. [16] 吴军.数学之美[M].北京:人民邮电出版社,2012. [17] 恶意代码网站.http://vxheaven.org. [18] 金雄斌.计算机病毒特征码自动提取技术的研究[D].武汉:华中科技大学,2011. [19] TANG Y,XIAO B,LU X.Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms[J].Computers & Security,2009,28(8):827-842. |
No related articles found! |
|