[1]IBM. 什么是恶意软件?[EBOL]. (20240815) [20250319]. https:www.ibm.comcnzh topicsmalware[2]AVTEST Institute. Malware statistics[EBOL]. (20241101) [20250319]. https:www.avtest.orgenstatisticsmalware[3]安天CERT. 2023网络安全威胁的回顾与展望[EBOL]. (20240208) [20250319]. https:www.antiy.comresponse2023_AnnualReport.html[4]Hochreiter S, Schmidhuber J. Long shortterm memory[J]. Neural Computation, 1997, 9(8): 17351780[5]Zhang W, Liu J, Peng J, et al. Malware traffic detection based on type II fuzzy recognition[J]. Frontiers in Physics, 2024, 12: 1350117[6]Debas E, Alhumam N, Riad K. Unveiling the dynamic landscape of malware sandboxing: A comprehensive review[J]. International Journal of Advanced Computer Science and Applications, 2024, 15(3): 14021416[7]Zhang S, Hu C, Wang L, et al. A malware detection approach based on deep learning and memory forensics[J]. Symmetry, 2023: 15(3): 758776[8]唐永旺, 王刚, 郭志刚, 等. 基于BiLSTM和自注意力的恶意代码检测方法及系统[J]. 计算机应用与软件, 2021, 38(3): 327333[9]Karat G, Kannimoola J M, Nair N, et al. CNNLSTM hybrid model for enhanced malware analysis and detection[J]. Procedia Computer Science, 2024, 233: 492503[10]Min Z, Xueqin Z, Weiyi Z, et al. Malware detection method based on LSTMSVM model[J]. Journal of East China University of Science and Technology, 2022, 48(5): 677684[11]Madhu G. Design of intrusion detection and prevention model using COOT optimization and hybrid LSTMKNN classifier for MANET[J]. EAI Endorsed Trans on Scalable Information Systems, 2023, 10(3): 119[12]Gupta I, Kumari S, Jha P, et al. Leveraging LSTM and GAN for modern malware detection[J]. arXiv preprint, arXiv:2405.04373, 2024[13]Yazi A F, atak F , Gül E. Classification of methamorphic malware with deep learning(LSTM)[C] Proc of the 27th Signal Processing and Communications Applications Conference (SIU). Piscataway, NJ: IEEE, 2019: 14[14]Vohra M, Tiwari A, Sharma P, et al. Malware detection using deep learning[C] Proc of Int Conf on Information, Technology and Engineering 2023(InCITe 2023). Berlin: Springer, 2023: 215231[15]Naeem H, Batool A. Malware attacks detection in network security using deep learning approaches[J]. International Journal for Electronic Crime Investigation, 2023, 7(3): 3144[16]Haddadpajouh H, Dehghantanha A, Khayami R, et al. A deep recurrent neural network based approach for Internet of things malware threat hunting[J]. Future Generation Computer Systems, 2018, 85(2): 8896[17]Farzaan M, Ghanem M C, ElHajjar A, et al. Leveraging LSTM and GAN for modern malware detection[J]. arXiv preprint, arXiv:2404.05602, 2024
|