Amanote Research

Amanote Research

    RegisterSign In

Malware Detection Through Mining Symbol Table of Linux Executables

Information Technology Journal
doi 10.3923/itj.2013.380.384
Full Text
Open PDF
Abstract

Available in full text

Date

February 1, 2013

Authors
Jinrong BaiYanrong YangShiguang MuYu Ma
Publisher

Science Alert


Related search

Malware Detection System Using Machine Learning and DATA-Mining Techniques

International Journal of Engineering and Advanced Technology
EngineeringComputer Science ApplicationsEnvironmental Engineering
2019English

Polonium: Tera-Scale Graph Mining and Inference for Malware Detection

2011English

Malware Detection Using Honeypot and Malware Prevention

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY
2019English

An Efficient Mining Based Approach Using PSO Selection Technique for Analysis and Detection of Obfuscated Malware

Journal of Information Assurance & Cybersecurity
2018English

Detection of Malicious Executables Using Rule Based Classification Algorithms

2018English

Improved Detection of Differential Phase Shift Keying Through Multi-Symbol Phase Estimation

2005English

Classification of Packed Executables for Accurate Computer Virus Detection

Pattern Recognition Letters
Signal ProcessingComputer VisionPattern RecognitionArtificial IntelligenceSoftware
2008English

Vigenère Score for Malware Detection

English

Quantifying Malware Evolution Through Archaeology

Journal of Information Security
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy