ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Search algorithm based on priority in semantic method for malicious code detection
2013 International Conference on Information and Network Security (ICINS 2013)
◽
10.1049/cp.2013.2448
◽
2013
◽
Author(s):
Ke Wang
◽
Han Zhang
◽
Jiansheng Han
Keyword(s):
Search Algorithm
◽
Malicious Code
◽
Malicious Code Detection
Download Full-text
Related Documents
Cited By
References
A Method for Efficient Malicious Code Detection Based on Conceptual Similarity
Computational Science and Its Applications - ICCSA 2006 - Lecture Notes in Computer Science
◽
10.1007/11751632_62
◽
2006
◽
pp. 567-576
◽
Cited By ~ 2
Author(s):
Sungsuk Kim
◽
Chang Choi
◽
Junho Choi
◽
Pankoo Kim
◽
Hanil Kim
Keyword(s):
Malicious Code
◽
Conceptual Similarity
◽
Malicious Code Detection
Download Full-text
Design of Malicious Code Detection System Based on Binary Code Slicing
電腦學刊
◽
10.53106/199115992021083204018
◽
2021
◽
Vol 32
(4)
◽
pp. 225-238
Author(s):
Zhiyuan Zhang Zhiyuan Zhang
◽
Zhenjiang Zhang Zhiyuan Zhang
◽
Bo Shen Zhenjiang Zhang
Keyword(s):
Binary Code
◽
Detection System
◽
Malicious Code
◽
Malicious Code Detection
Download Full-text
Malicious Code Detection Based on Software Fingerprint
Proceedings of the 2013 International Conference on Advanced Computer Science and Electronics Information
◽
10.2991/icaise.2013.45
◽
2013
◽
Cited By ~ 1
Author(s):
Zhimin Yin
◽
Xiangzhan Yu
◽
Linhua Niu
Keyword(s):
Malicious Code
◽
Malicious Code Detection
Download Full-text
Time and Location Power Based Malicious Code Detection Techniques for Smartphones
2014 IEEE 13th International Symposium on Network Computing and Applications
◽
10.1109/nca.2014.45
◽
2014
◽
Cited By ~ 4
Author(s):
Bryan Dixon
◽
Shivakant Mishra
◽
Jeannette Pepin
Keyword(s):
Malicious Code
◽
Detection Techniques
◽
Malicious Code Detection
Download Full-text
Malicious Code Detection Scheme Based on CWRNN for Microgrid Controllers
2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)
◽
10.1109/ei247390.2019.9061849
◽
2019
◽
Author(s):
Tao Zhao
◽
Xiaoyu Ji
◽
Wenyuan Xu
◽
Aidong Xu
◽
Yixin Jiang
◽
...
Keyword(s):
Malicious Code
◽
Detection Scheme
◽
Malicious Code Detection
Download Full-text
Malicious Code Detection Using Penalized Splines on OPcode Frequency
2012 Third Cybercrime and Trustworthy Computing Workshop
◽
10.1109/ctc.2012.15
◽
2012
◽
Cited By ~ 1
Author(s):
Mamoun Alazab
◽
Mohammad Al Kadiri
◽
Sitalakshmi Venkatraman
◽
Ameer Al-Nemrat
Keyword(s):
Malicious Code
◽
Penalized Splines
◽
Malicious Code Detection
Download Full-text
An Efficient Malicious Code Detection System Based on Convolutional Neural Networks
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence - CSAI '18
◽
10.1145/3297156.3297246
◽
2018
◽
Author(s):
Dongzhi Cao
◽
Xinglan Zhang
◽
Zhenhu Ning
◽
Jianfeng Zhao
◽
Fei Xue
◽
...
Keyword(s):
Neural Networks
◽
Convolutional Neural Networks
◽
Detection System
◽
Malicious Code
◽
Malicious Code Detection
Download Full-text
Investigating clustering algorithm DBSCAN to self select locations for power based malicious code detection on smartphones
2017 Third International Conference on Mobile and Secure Services (MobiSecServ)
◽
10.1109/mobisecserv.2017.7886567
◽
2017
◽
Author(s):
Bryan Dixon
Keyword(s):
Clustering Algorithm
◽
Malicious Code
◽
Malicious Code Detection
Download Full-text
A static Android malicious code detection method based on multi-source fusion
Security and Communication Networks
◽
10.1002/sec.1248
◽
2015
◽
Vol 8
(17)
◽
pp. 3238-3246
◽
Cited By ~ 15
Author(s):
Yao Du
◽
Xiaoqing Wang
◽
Junfeng Wang
Keyword(s):
Detection Method
◽
Malicious Code
◽
Malicious Code Detection
Download Full-text
Malicious code detection by taint analysis
2010 International Conference on Multimedia Communications
◽
10.1109/mediacom.2010.56
◽
2010
◽
Cited By ~ 1
Author(s):
Zhang Zhigang
◽
Guo Fan
Keyword(s):
Malicious Code
◽
Taint Analysis
◽
Malicious Code Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close