[1] Forrest S, Hofmeyr S A, Somayaji A. A Sense of Self for UNIX Processes[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 1996.
[2] Mutz D, Valeur F, Kruegel C, et al. Anomalous System Call Detection[J]. ACM Trans. on Information and System Security, 2006, 9(1): 1-31.
[3] 孙晓妍, 祝跃飞, 黄 茜, 等. 基于系统调用踪迹的恶意行为规范生成[J]. 计算机应用, 2010, 30(7): 1767-1770.
[4] Forrest W S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 1999.
[5] 王 蕊, 冯登国, 杨 轶, 等. 基于语义的恶意代码行为特征提取及检测方法[J]. 软件学报, 2012, 23(2): 378-393.
[6] Guo Shanqing, Yuan Qixia, Lin Fengbo, et al. A Malware Detection Algorithm Based on Multi-view Fusion[C]//Proc. of ICONIP’10. Sydney, Australia: [s. n.], 2010.
[7] 陈 培, 高 维. 恶意代码行为获取的研究与实现[J]. 计算机应用, 2009, 29(2): 76-82.
[8] Witten I H, Frank E, Hall M A. Data Mining: Practical Machine Learning Tools and Techniques[M]. [S. l.]: Morgan Kaufmann Publisher, 2011. |