Zhong et al, "A Malware Classification Method based on Similarity of Function Structure", 2012, IEEE/IPSJ 12th International Symposium on Applications and
the Internet, pp. 256-261. (Year: 2012). cited by examiner
. Shen et al, "Detect Android Malware Variants using Component Based Topology Graph", 2014, IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 406-413. (Year: 2014). cited by examiner
. Apel et al, "Measuring Similarity of Malware Behavior", Oct. 2009, IEEE, pp. 891-898. (Year: 2009). cited by examiner
. Aresu et al., "Clustering android malware families by http traffic," 2015 10th International Conference on Malicious and Unwanted Software (Malware), Fajardo, pp. 128-135, 2015. cited by applicant
. Chinmayee Annachhatre, "Hidden Markov Models for Malware Classification". Master's Projects. 328. 2013. cited by applicant
. Flaglien et al., "Identifying Malware Using Cross-Evidence Correlation", In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics VII, IFIP Advances in Information and Communication Technology, vol. 361. Springer, Berlin, Heidelberg, 2011.
cited by applicant
. Kolosnjaji et al., "Deep learning for classification of malware system call sequences", In Australasian Joint Conference on Artificial Intelligence (pp. 137-149). Springer, Cham. Dec. 2016. cited by applicant
. Matthew Asquith, "Extremely scalable storage and clustering of malware metadata", Comput Virol Hack Tech, 12: 49. 2016. cited by applicant
. Pai et al., "Clustering for malware classification." 2016. cited by applicant
. Rafique et al., "Firma: Malware clustering and network signature generation with mixed network behaviors." International Workshop on Recent Advances in Intrusion Detection. Springer, Berlin, Heidelberg, 2013. cited by applicant
. Teufl et al., "Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)". Secur. Commun. Netw. 9(5), 389-419, 2016. cited by applicant
. Usha Narra, "Clustering versus SVM for Malware Detection" Master's Projects. 405. 2015. cited by applicant
. West et al., "Metadata-driven threat classification of network endpoints appearing in malware", In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 152-171). Springer, Cham. Jul. 2014. cited by
applicant
. Author Unknown, About VirusTotal, downloaded from https_www.virustotal.com_en_about on Feb. 17, 2016. cited by applicant
. Author Unknown, Advanced features & tools, VirusTotal, downloaded from https_www.virustotal.com_en_documentation on Feb. 17, 2016. cited by applicant
. Author Unknown, File statistics during last 7 days, VirusTotal, downloaded from https_www.virustotal.com_en_statistics on Feb. 17, 2016. cited by applicant
. Author Unknown, Frequently Asked Questions, VirusTotal, downloaded from https_www.virustotal.com_en_faq on Feb. 17, 2016. cited by applicant
. Bailey et al., Automated Classification and Analysis of Internet Malware, Electrical Engineering and Computer Science Department, University of Michigan, Apr. 26, 2007. cited by applicant
. Canto et al., Large scale malware collection: lessons learned, downloaded from http_www.iseclab.netpaperssrds.pdf on Feb. 17, 2016. cited by applicant
. Jang et al., BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis, Oct. 2011. cited by applicant
. Kinable et al., Malware Classification based on Call Graph Clustering, Aalto University, Department of Information and Computer Science, Aug. 27, 2010. cited by applicant
. Perdisci et al., Behavior Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces, College of Computing, Georgia Institute of Technology, Apr. 2010. cited by applicant
. Ye et al., Automatic Malware Categorization Using Cluster Ensemble, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, Jul. 2010. cited by applicant. |