Comparison of feature selection and classification algorithms in identifying malicious executables
暂无分享,去创建一个
[1] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[2] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[3] Thorsten Joachims,et al. Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.
[4] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Karl N. Levitt,et al. MCF: a malicious code filter , 1995, Comput. Secur..
[6] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[7] Yiming Yang,et al. A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.
[8] Salvatore J. Stolfo,et al. USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .
[9] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[10] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[11] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[12] Shi Bing,et al. Inductive learning algorithms and representations for text categorization , 2006 .
[13] Yiming Yang,et al. A re-examination of text categorization methods , 1999, SIGIR '99.
[14] Lior Rokach,et al. Detection of unknown computer worms based on behavioral classification of the host , 2008, Comput. Stat. Data Anal..
[15] Yiming Yang,et al. A Study of Approaches to Hypertext Categorization , 2002, Journal of Intelligent Information Systems.
[16] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[17] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .
[18] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[19] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[20] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[21] David D. Lewis,et al. A comparison of two learning algorithms for text categorization , 1994 .
[22] S. Sathiya Keerthi,et al. Improvements to Platt's SMO Algorithm for SVM Classifier Design , 2001, Neural Computation.
[24] George Forman,et al. An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..
[25] Stephen D. Crocker,et al. A proposal for a verification-based virus filter , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[26] Karl N. Levitt,et al. Towards a testbed for malicious code detection , 1991, COMPCON Spring '91 Digest of Papers.
[27] William C. Arnold,et al. AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION , 2000 .
[28] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[29] David D. Lewis,et al. An evaluation of phrasal and clustered representations on a text categorization task , 1992, SIGIR '92.