Intelligent automatic malicious code signatures extraction (original) (raw)

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

Abstract

... The first is called virus which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable ... [I31 Dmitry Gryaznov, “Scanners of the Year 2000: Heuristics”, Proceedings of the 5rh International Virus Bulletin, 1999. [ 141R. ...

Peter Deng hasn't uploaded this paper.

Let Peter know you want this paper to be uploaded.

Ask for this paper to be uploaded.