[1]Zhang B, Yin J, Tang W, et al. Unknown malicious codes detection based on rough set theory and support vector machine[C] Proc of Int Joint Conf on Neural Networks (IJCNN06). Piscataway, NJ: IEEE, 2006: 25832587[2]Santos I, Brezo F, Nieves J, et al. Idea: Opcodesequencebased malware detection[M] Engineering Secure Software and Systems. Berlin: Springer, 2010: 3543[3]Moskovitch R, Feher C, Tzachar N, et al. Unknown malcode detection using OPCODE representation[C] Proc of the 1st European Conf on Intelligence and Security Informatics. Berlin: Springer, 2008: 204215[4]王蕊, 冯登国, 杨轶, 等. 基于语义的恶意代码行为特征提取及检测方法[J]. 软件学报, 2012, 23(2): 378393[5]Windows系统调用架构分析——也谈KiFastCallEntry函数地址的获取[OL]. [20151205]. http:blog.csdn.netotishionoarticledetails7606429[6]Li J, Xu J, Xu M, et al. Malware obfuscation measuring via evolutionary similarity[C] Proc of the 1st Int Conf on Future Information Networks (ICFIN 2009). Piscataway, NJ: IEEE, 2009: 197200[7]李政廉, 舒辉, 康绯, 等. 基于API关联性的恶意行为层次化分析方法[J]. 计算机工程与设计, 2014, 35(11): 37303735[8]Deep Learning in NLP——词向量和语言模型[OL].[20151227]. http:licstar.netarchives328[9]Bengio Y, Schwenk H, Senécal J S, et al. A neural probabilistic language model[J]. Journal of Machine Learning Research, 2003, 3(6): 11371155[10]Le Q V, Mikolov T. Distributed representations of sentences and documents[J]. Eprint Arxiv, 2014, 4: 11881196 |