[1]Wang Z, Nascimento M, MacGregor M H. A multidisciplinary approach for online detection of X86 malicious executables[C] Proc of Communication Networks and Services Research Conf (CNSR). Piscataway, NJ: IEEE, 2010: 160167[2]Patel S, Patel V, Jinwala D. Privacy preserving distributed kmeans clustering in malicious model using zero knowledge proof[M] Distributed Computing and Internet Technology. Berlin: Springer, 2013: 420431[3]Fu L, Zhang T, Zhang H, et al. A fuzzy classification method based on feature selection algorithm in malicious script code detection[C] Proc of 2011 IEEE Int Conf on System Science, Engineering Design and Manufacturing Informatization (ICSEM). Piscataway, NJ: IEEE, 2011: 218221[4]Hsiao H W, Chen D N, Wu T J. Detecting hiding malicious website using network traffic mining approach[C] Proc of the 2nd Int Conf on Education Technology and Computer (ICETC). Piscataway, NJ: IEEE, 2010: V5276V5280[5]Thuraisingham B M. Data mining for security applications[M] Intelligence and Security Informatics. Berlin: Springer, 2006: 13[6]黄聪会, 陈靖, 龚水清, 等. 一种基于危险理论的恶意代码检测方法[J]. 中南大学学报: 自然科学版, 2014, 45(9): 30553060[7]Lee T, Kim D, Jeong H, et al. Risk prediction of malicious codeinfected websites by mining vulnerability features[J]. International Journal of Security and Its Applications, 2014, 8(1): 291294[8]Ramani R G, Kumar S S, Jacob S G. Rootkit (malicious code) prediction through data mining methods and techniques[C] Proc of 2013 IEEE Int Conf on Computational Intelligence and Computing Research (ICCIC). Piscataway, NJ: IEEE, 2013: 15[9]Li X, Dong X, Wang Y. Malicious code forensics based on data mining[C] Proc of the 10th Int Conf on Fuzzy Systems and Knowledge Discovery (FSKD). Piscataway, NJ: IEEE, 2013: 978983[10]Li Y, Ma R, Jiao R. A hybrid malicious code detection method based on deep learning[J]. Methods, 2015, 9(5): 205216 |