Tài liệu tham khảo |
Loại |
Chi tiết |
[2] Daniele Ucci, Leonardo, Roberto Baldoni, "Survey of Machine Learning Techiniques for Malware Analysis", Computer & Security (2018) |
Sách, tạp chí |
Tiêu đề: |
Survey of Machine LearningTechiniques for Malware Analysis |
|
[3] Prakash Mandayam Commar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan+, Antonio Nucci "Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection" , 2013 Proceedings IEEE INFOCOM |
Sách, tạp chí |
Tiêu đề: |
Combining Supervised and UnsupervisedLearning for Zero-Day Malware Detection |
|
[4] Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee “McPAD: A Multiple Classifer System for Accurate Payload-based Anomaly Detection”, Preprint submitted to Elsevier Science (2008) |
Sách, tạp chí |
Tiêu đề: |
McPAD: A Multiple Classifer System for Accurate Payload-based Anomaly Detection |
|
[6] Michael Sikrski and Andrew Honig “Practical Malware Analysis – The Hands-On Guide to Dissecting Malicious Software” |
Sách, tạp chí |
Tiêu đề: |
Practical Malware Analysis – The Hands-On Guide to Dissecting Malicious Software |
|
[7] Savan Gadhiya and Kaushal Bhavsar, “Techniques for Malware Analysis”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 4, pp. 972-975, April 2013 |
Sách, tạp chí |
Tiêu đề: |
Techniques for MalwareAnalysis |
|
[9] Peter Harrington, “Machine Leaning in Action”, in Part 1 Classification, by Manning Publications, 2012, pp 1-129 |
Sách, tạp chí |
Tiêu đề: |
Machine Leaning in Action |
|
[10] Trent Hauck, “scikit-learn Cookbook”, in Chapter 4 Classifying Data with scikit-learn, by Packt Publishing, 2014, pp. 119-157 |
Sách, tạp chí |
Tiêu đề: |
scikit-learn Cookbook |
|
[5] William Stallings, "Network Security Essentials: Applications and Standard Foutth Edition" |
Khác |
|
[8] Nayan Zalavadiya1 Dr. Priyanka Sharma2, "A Methodology of Malware Analysis, Tools and Technique for windows platform – RAT Analysis" |
Khác |
|
[14] Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and IntrusionTraffic Characterization" |
Khác |
|
[15] Andi FitriahA. Kadir, Laya Taheri and Ali A. Ghorbani "Toward Developing a Systematic Approach toGenerate Benchmark Android Malware Datasets and ClassificationArashHabibiLashkari" |
Khác |
|