[1] |
National Internet Emergency Center. China's Internet Network Security Situation in the First Half of 2019[EB/OL]. http://www.cac.gov.cn/2019-08/13/c_1124871484.htm, 2020-6-1.
|
|
国家互联网应急中心. 2019年上半年我国互联网网络安全态势[EB/OL]. http://www.cac.gov.cn/2019-08/13/c_1124871484.htm, 2020-6-1.
|
[2] |
BAEK H W, SRIVASTAVA A, DER MERWE J V, et al. CloudVMI: Virtual Machine Introspection as a Cloud Service[C]// IEEE. IEEE International Conference on Cloud Engineering, March 11-14, 2014, Washington, DC, USA. New Jersey: IEEE, 2014: 153-158.
|
[3] |
GARFINKEL T, ROSENBLUM M. A Virtual Machine Introspection Based Architecture for Intrusion Detection[EB/OL]. https://suif.stanford.edu/papers/vmi-ndss03.pdf, 2020-6-1.
|
[4] |
NANCE K, BISHOP M, HAY B. Virtual Machine Introspection: Observation or Interference[J]. IEEE Security & Privacy Magazine, 2008,6(5):32-37.
|
[5] |
PFOH J, SCHNEIDER C, ECKERT C. A Formal Model for Virtual Machine Introspection[EB/OL]. http://www.cs.jhu.edu/~sdoshi/jhuisi650/papers/spimacs/SPIMACS_CD/vmsec/p1.pdf, 2020-6-1.
|
[6] |
LI Baohui, XU Kefu, ZHANG Peng, et al. Research and Application Progress of Virtual Machine Introspection Technology[J]. Journal of Software, 2016,27(6):1384-1401.
|
|
李保珲, 徐克付, 张鹏, 等. 虚拟机自省技术研究与应用进展[J]. 软件学报, 2016,27(6):1384-1401.
|
[7] |
SCHULTZ M G, ESKIN E, ZADOK F, et al. Data Mining Methods for Detection of New Malicious Executables[EB/OL]. http://cseweb.ucsd.edu/~eeskin/papers/binaryeval-ieeesp01.pdf, 2020-6-1.
|
[8] |
CONTI G, BRATUS S, SHUBINA A, et al. Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification[EB/OL]. https://dl.acm.org/doi/10.1016/j.diin.2010.05.002, 2020-6-1.
|
[9] |
VASAN D, ALAZAB M, WASSAN S, et al. IMCFN: Image-based Malware Classification Using Fine-tuned Convolutional Neural Network Architecture[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S1389128619304736, 2020-6-1.
|
[10] |
NI Sang, QIAN Quan, ZHANG Rui. Malware Identification Using Visualization Images and Deep Learning[EB/OL]. https://www.sciencedirect.com/science/article/pii/S0167404818303481, 2020-6-1.
|
[11] |
DAI Yusheng, LI Hui, QIAN Yekui, et al. A Malware Classification Method Based on Memory Dump Grayscale Image[J]. Digital Investigation, 2018,27(12):30-37.
doi: 10.1016/j.diin.2018.09.006
URL
|
[12] |
OJALA T, PIETIKINEN M, HARWOOD D. A Comparative Study of Texture Measures with Classification Based on Featured Distributions[J]. Pattern Recognition the Journal of the Pattern Recognition Society, 1996,29(1):51-59.
|
[13] |
BAMS D, LEHNERT T, WOLFF C P. Loss Functions in Option Valuation: A Framework for Selection[J]. Management Science, 2009,55(5):853-862.
doi: 10.1287/mnsc.1080.0976
URL
|