Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 342-345.doi: 10.11896/j.issn.1002-137X.2016.11A.079
Previous Articles Next Articles
QI Fa-zhi and SUN Zhi-hui
[1] Branco R R,Shamir U.Architecture for automation of malware analysis[C]∥The 5th International Conference on Malicious and Un-wanted Software (MALWARE).2010:106-112 [2] Egele M,Scholte T,Kirda E,et al.A survey on automated dynamic malware-analysis techniques and tools[J].ACM Computing Surveys (CSUR),2012,44(2):1-42 [3] Sathyanarayan V S,Kohli P,Bruhadeshwar B.Signature generation and detection of malware families[C]∥Information Secu-rity and Privacy.2008:336-349 [4] Staish S,Pereira S.Behavioral Signature Generation Using Clustering:WIPO Patent 2011137083[P].2011 [5] http://www.m86security.com/newsimages/trace/Marshal8e6_TRACE_Report_July_2015.pdf |
No related articles found! |
|