2017
DOI: 10.1016/j.cose.2017.02.009
|View full text |Cite
|
Sign up to set email alerts
|

Security importance assessment for system objects and malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…Authors in [13] presented a compression-based feature mining on system/API calls' quantitative information flow graphs to detect Windows malware. Mao et al [14] designed a security dependence network from access behaviors to evaluate importance of system resources (e.g., files, registry, and processes) and malware detection. While, Egele et al [15] presented a dynamic blanket execution function that employs high-level API-relevant semantic features.…”
Section: ) Static Analysismentioning
confidence: 99%
“…Authors in [13] presented a compression-based feature mining on system/API calls' quantitative information flow graphs to detect Windows malware. Mao et al [14] designed a security dependence network from access behaviors to evaluate importance of system resources (e.g., files, registry, and processes) and malware detection. While, Egele et al [15] presented a dynamic blanket execution function that employs high-level API-relevant semantic features.…”
Section: ) Static Analysismentioning
confidence: 99%
“…Mao et al [16] proposed a system for building security dependency to measure the significance of security of a system from a wide perspective of the system. e effect of small-world and power-law distribution for the degree for in-and out-degree in security dependency network was observed.…”
Section: Related Workmentioning
confidence: 99%
“…e evaluation models from 2000 to 2018 have been reviewed for e-commerce [21]. Mao et al [22] proposed a system for building security dependency to measure the significance of security of system from a wide perspective of the system. e effect of small-world and power-law distribution for the degree of in-and out-degree in security dependency network was observed.…”
Section: Related Workmentioning
confidence: 99%