注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Network Behavioral Analysis for Detection of Remote Access Trojans
作者: Khin Swe Yin
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
0
ucsy.edu.mm
本地加速
暂无可下载资源,当前可以选择系统获取到有开放资源时
通知我
或者直接发起求助
文献求助
参考文章
(23)
1.
N. Tawbi, M. Debbabi, J. Desharnais, Y. Lavoie, J. Bergeron, M. M. Erhioui,
Static Detection of Malicious Code in Executable Programs
,(2000)
2.
Smita Ranveer, Swapnaja Hiray,
Comparative Analysis of Feature Extraction Methods of Malware Detection
International Journal of Computer Applications.
,vol. 120, pp. 1- 7 ,(2015) ,
10.5120/21220-3960
3.
Ratinder Kaur, , Maninder Singh,
A Hybrid Real-time Zero-day Attack Detection and Analysis System
International Journal of Computer Network and Information Security.
,vol. 7, pp. 19- 31 ,(2015) ,
10.5815/IJCNIS.2015.09.03
4.
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga,
Detecting Self-mutating Malware Using Control-Flow Graph Matching
Detection of Intrusions and Malware & Vulnerability Assessment.
,vol. 4064, pp. 129- 143 ,(2006) ,
10.1007/11790754_8
5.
Pankaj Jalote,
An Integrated Approach to Software Engineering
,(1994)
6.
Yi-Min Wang, D. Beck, Binh Vo, R. Roussev, C. Verbowski,
Detecting stealth software with Strider GhostBuster
dependable systems and networks.
pp. 368- 377 ,(2005) ,
10.1109/DSN.2005.39
7.
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji,
Intrusion detection using sequences of system calls
Journal of Computer Security.
,vol. 6, pp. 151- 180 ,(1998) ,
10.3233/JCS-980109
8.
Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, Ali Hamzeh,
A survey on heuristic malware detection techniques
conference on information and knowledge technology.
pp. 113- 120 ,(2013) ,
10.1109/IKT.2013.6620049
9.
Kyoochang Jeong, Heejo Lee,
Code Graph for Malware Detection
international conference on information networking.
pp. 1- 5 ,(2008) ,
10.1109/ICOIN.2008.4472801
10.
Jusuk Lee, Kyoochang Jeong, Heejo Lee,
Detecting metamorphic malwares using code graphs
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10.
pp. 1970- 1977 ,(2010) ,
10.1145/1774088.1774505
来源期刊
University of Computer Studies, Yangon
2019 年,
Volume: , Issue: ,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...