|
[1] M. Li, X. Chen, X. Li, B. Ma, and P. M. Vitányi, “The similarity metric,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3250–3264, 2004. [2] N. Alshahwan, E. T. Barr, D. Clark, and G. Danezis, “Detecting malware with information complexity,” CoRR, vol. abs/1502.07661, 2015. [3] J. Andersen, F. Jahanian, Z. M. Mao, J. Nazario, J. Oberheide, and M. Bailey, “Automated Classification and Analysis of Internet Malware,” Recent Advances in Intrusion Detection, pp. 178–197, 2007. [4] M. Hayes, A. Walenstein, and A. Lakhotia, “Evaluation of malware phylogeny modelling systems using automated variant generation,” Journal in Computer Virology, vol. 5, p. 335, Jul 2008. [5] S. Wehner, “Analyzing worms and network traffic using compression,” Journal of Computer Security, vol. 15, no. 3, pp. 303–320, 2007. [6] E. Raff and C. Nicholas, “An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance,” Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’17, pp. 1007–1015, 2017. [7] E.RaffandC.Nicholas,“Malware Classification and Class Imbalance via Stochastic Hashed LZJD,” Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security - AISec ’17, pp. 111–120, 2017. [8] Y. M. Wang, D. Beck, X. Jiang, and R. Roussev, “Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities,” Tech. Rep. MSR-TR-2005-72, August 2005. [9] M. Roesch, “Snort - lightweight intrusion detection for networks,” Proceedings of the 13th USENIX Conference on System Administration, pp. 229–238, 1999. [10] A. Ikinci, T. Holz, and F. C. Freiling, “Monkey-Spider: Detecting Malicious Web- sites with Low-Interaction Honeyclients,” Igarss 2014, no. 1, pp. 1–5, 2014. [11] R. S. Borbely, “On normalized compression distance and large malware: Towards a useful definition of normalized compression distance for the classification of 30 large files,” Journal of Computer Virology and Hacking Techniques, vol. 12, no. 4, pp. 235–242, 2016. [12] “Rhino - mozilla | mdn.” https://developer.mozilla.org/en-US/docs/ Mozilla/Projects/Rhino. [13] “Alexa.” https://www.alexa.com/topsites. [14] “Scumware.” https://www.scumware.org/. [15] “Clean-mx.” https://support.clean-mx.com/clean-mx/viruses.php. [16] “Github:hynekpetrak/ javascript-malware-collection.” https://github.com/ HynekPetrak/javascript-malware-collection. [17] “Github:geeksonsecurity/ js-malicious-dataset.” https://github.com/ geeksonsecurity/js-malicious-dataset. [18] “Virustotal.” https://www.virustotal.com/gui/home/upload.
|