Liu Xin, Liu Ren-ren, and Wu Xiang-bo
[1] W. Xin Zhi, S. Le Chang, Z. Min, and C. Tao, Maliciousbehavior detection method based on sequence pattern discovery,Computer Engineering, 37(24), 2011, 144–147. [2] Fei Sike technology R & D center, Delphi depth Windowscore programming (Beijing: Electronic Industry Press, 2003),256–265. [3] B. Jin Rong, W. Jun Feng, Z. Zong Qu, and L. Da Fu,The sensitive native API-based malware detection method,Computer Engineering, 38(13), 2012, 152–156. [4] Microsoft Corporation, MSDN Library for Visual Studio 2005[EB/OL], 2004. [5] M. De Cao, The Windows kernel scenario analysis – usingopen source code ReactOS (upper and lower volumes) (Beijing:Electronic Industry Press, 2009), 433–442. [6] J. Hui, Y. Feng, and D. Hai Xin, Rootkit hidden technologyand detection methods research, Mini-Micro Systems, 33(5),2012, 58–62. [7] Z. Fan and C.-C. Shi, Driven development techniques explain(Beijing: Electronic Industry Press, 2008), 351–358. [8] M.A. Rajab and A. Terzis, On the effectiveness of distributedworm monitoring, Proc. 14th USENIX Security Symposium,Baltimore, 2005, 124–130. [9] S.T. King and P.M. Chen, Implementing malware with vir-tual machines, IEEE Symposium on Security and Privacy,California, 2006, 212–220. [10] G. Gu, et al., BotHunter: Detecting malware infection throughIDS-driven dialog correlation, Proc of 16th USENIX SecuritySymposium, Boston, 2007, 224–230.
Important Links:
Go Back