作者: Hyunjae Kang , Jae-wook Jang , Aziz Mohaisen , Huy Kang Kim , None
DOI: 10.1155/2015/479174
关键词:
摘要: … Similarity score between two kinds of malware is computed by using each similarity 𝑆𝑖 of suspicious API string, malicious commands, and critical permissions. The similarity score SS …