參考文獻 |
[1] B. C. da Rocha, L. P. de Melo, and R. T. de Sousa, "Preventing APT attacks on LAN networks with connected IoT devices using a zero trust based security model," 2021 Workshop on Communication Networks and Power Systems (WCNPS), pp. 1-6, 2021.
[2] "Cyber Kill Chain®." https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html (accessed 2023).
[3] M. Apostol, B. Paliniuc, R. Morar, and F. Vidu, "Malicious Strategy: Watering Hole Attacks," Romanian Cyber Security Journal, 2022.
[4] E. Raff, J. Sylvester, and C. Nicholas, "Learning the PE Header, Malware Detection with Minimal Domain Knowledge," presented at the Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, Dallas, Texas, USA, 2017. [Online]. Available: https://doi.org/10.1145/3128572.3140442.
[5] Hyrum and P. Roth, "EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models," arXiv pre-print server, 2018-04-16 2018, doi: None
[6] H.-D. Pham, T. D. Le, and T. N. Vu, "Static PE Malware Detection Using Gradient Boosting Decision Trees Algorithm," Springer International Publishing, 2018, pp. 228-236.
[7] E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas, "Malware Detection by Eating a Whole EXE," arXiv pre-print server, 2017-10-25 2017, doi: None arxiv:1710.09435.
[8] M. Krcál, O. Švec, M. Bálek, and O. Jasek, "Deep Convolutional Malware Classifiers Can Learn from Raw Executables and Labels Only," in International Conference on Learning Representations, 2018.
[9] D. Gibert, C. Mateu, J. Planes, and R. Vicens, "Using convolutional neural networks for classification of malware represented as images," Journal of Computer Virology and Hacking Techniques, vol. 15, no. 1, pp. 15-28, 2019, doi: 10.1007/s11416-018-0323-0.
[10] P. Bagane, S. G. Joseph, A. Singh, A. Shrivastava, B. Prabha, and A. Shrivastava, "Classification of Malware using Deep Learning Techniques," in 2021 9th International Conference on Cyber and IT Service Management (CITSM), Bengkulu, Indonesia, 2021: IEEE, pp. 1-7, doi: 10.1109/citsm52892.2021.9588795. [Online]. Available: https://dx.doi.org/10.1109/citsm52892.2021.9588795
[11] D. Vasan, M. Alazab, S. Wassan, B. Safaei, and Q. Zheng, "Image-Based malware classification using ensemble of CNN architectures (IMCEC)," Computers & Security, vol. 92, p. 101748, 2020, doi: 10.1016/j.cose.2020.101748.
[12] D. Kim, D. Mirsky, A. Majlesi-Kupaei, and R. Barua, "A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware," 2018: IEEE, doi: 10.1109/malware.2018.8659373. [Online]. Available: https://dx.doi.org/10.1109/malware.2018.8659373
[13] S. Cesare and Y. Xiang, "A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost," in 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010: IEEE, doi: 10.1109/aina.2010.121. [Online]. Available: https://dx.doi.org/10.1109/aina.2010.121
[14] R. Thomas, "LIEF - Library to Instrument Executable Formats," 2017 2017. [Online]. Available: https://lief.quarkslab.com/.
[15] c. Wikipedia, "VirusTotal," in Wikipedia, The Free Encyclopedia., ed.
[16] A. K. Srivastava, A. S. Chauhan, S. Gupta, A. K. Gautam, and G. Kaur, "Malware Detection Using Online Information Sharing Platforms and Behavior Based Analysis," 2018. |