Exploring a Systematic Approach to Malware Threat Assessment

作者: Michele Maasberg , Nicole L. Ko , Myung , Beebe

DOI: 10.1109/HICSS.2016.682

关键词:

摘要: … The total score is then used to determine an overall threat level assessment on a scale category 1-5. Work remains to be done, including finding ways to apply it to malware that has not …

参考文章(29)
Aziz Mohaisen, Omar Alrawi, AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification workshop on information security applications. pp. 107- 121 ,(2014) , 10.1007/978-3-319-15087-1_9
Kevin Harnett, Charlie McCarthy, Art Carter, Cem Hatipoglu, Assessment of the Information Sharing and Analysis Center Model ,(2014)
Chen, Kataria, Krishnan, Correlated failures, diversification, and information security risk management Management Information Systems Quarterly. ,vol. 35, pp. 397- 422 ,(2011) , 10.2307/23044049
Jason Neal Frye, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino, Scott Maruoka, Cyber Threat Metrics Sandia National Laboratories. ,(2012) , 10.2172/1039394
Thomas L. Saaty, Analytic Hierarchy Process Encyclopedia of Biostatistics. ,(2005) , 10.1002/0470011815.B2A4A002
Arti Tiwari, Partha Sarathi Chakraborty, Software Component Quality Characteristics Model for Component Based Software Engineering computational intelligence. pp. 47- 51 ,(2015) , 10.1109/CICT.2015.40
Shahid Alam, R.Nigel Horspool, Issa Traore, Ibrahim Sogukpinar, A framework for metamorphic malware analysis and real-time detection Computers & Security. ,vol. 48, pp. 212- 233 ,(2015) , 10.1016/J.COSE.2014.10.011
Jeremy D. Seideman, Bilal Khan, Cesar Vargas, Quantifying Malware Evolution through Archaeology Journal of Information Security. ,vol. 6, pp. 101- 110 ,(2015) , 10.4236/JIS.2015.62011
Aziz Mohaisen, Omar Alrawi, Manar Mohaisen, None, AMAL: High-fidelity, behavior-based automated malware analysis and classification Computers & Security. ,vol. 52, pp. 251- 266 ,(2015) , 10.1016/J.COSE.2015.04.001