[1]瑞星. 瑞星2016年中国信息安全报告[EB/OL].[2018-03-10] .http://it.rising.com.cn/dongtai/18659.html
[2] 互联网安全中心. 360安全报告-2016年中国互联网安全报告[EB/OL]. [2018-03-10] .http://zt.360.cn/1101061855.php?dtid=11011062514&did=490278985
[3] Flake H. Structural comparison of executable objects[J]. DIMVA 2004, July 6-7, Dortmund, Germany, 2004
[4] Dullien T, Rolles R. Graph-based comparison of executable objects (english version)[J]. SSTIC, 2005, 5: 1-3
[5] Kolter J Z, Maloof M A. Learning to detect and classify malicious executables in the wild[J]. Journal of Machine Learning Research, 2006, 7(Dec): 2721-2744
[6] 杨轶, 苏璞睿, 应凌云, 等. 基于行为依赖特征的恶意代码相似性比较方法[J]. 软件学报, 2011, 22(10): 2438-2453
[7] Kancherla K, Mukkamala S. Image visualization based malware detection[C]//Proc of IEEE Symposium on Computational Intelligence in Cyber Security (CICS). Piscataway,NJ:IEEE, 2013: 40-44
[8] 徐小琳, 云晓春, 周勇林, 等. 基于特征聚类的海量恶意代码在线自动分析模型[J]. 通信学报, 2013, 34(8): 146-153
[9] Cesare S, Xiang Y, Zhou W. Malwise—An effective and efficient classification system for packed and polymorphic malware[J]. IEEE Transon Computers, 2013, 62(6): 1193-1206
[10] Oliva A, Torralba A. Building the gist of a scene: The role of global image features in recognition[J]. Progress in Brain Research, 2006, 155: 23-36
[11] Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110
[12] Haralick R M, Shanmugam K. Textural features for image classification[J]. IEEE Trans on systems, man, and cybernetics, 1973, 3(6): 610-621
[13] 韩晓光, 姚宣霞, 曲武, 等. 基于图像纹理聚类的恶意代码家族标注方法[J]. 解放军理工大学学报: 自然科学版, 2014, 15(5): 440-449
[14] Ulaby F T, Kouyate F, Brisco B, et al. Textural infornation in SAR images[J]. IEEE Trans on Geoscience and Remote Sensing, 1986 (2): 235-245
[15] Moskovitch R, Feher C, Tzachar N, et al. Unknown malcode detection using opcode representation[J]. Intelligence and Security Informatics, 2008: 204-215
[16] Microsoft Malware Classification[OL].[2018-03-10]. https://www.kaggle.com/c/malware-classificaton
|