参考文献/References:
[1]Nataraj L, Karthikeyan S, Jacob G, et al. Malware images: visualization and automatic classification[C]//Proceedings of the 8th International Symposium on Visualization for Cyber Security(VizSec’1), New York, USA, 2011.
[2]Fairuz, Amalina, Narudin, et al. Evaluation of machine learning classifiers for mobile malware detection[J]. Soft Computing, 2016,20(1):343-357.
[3]任卓君, 陈光,卢文科. 基于N-gram特征的恶意代码可视化方法[J]. 电子学报, 2019, 47(10): 2108-2115.
[4]Yan H, Zhou H, Zhang H. Automatic malware classification via PRICoLBP[J]. Chinese Journal of Electronics, 2018, 27(4): 852-859.
[5]乔延臣, 云晓春, 张永铮, 等. 基于调用习惯的恶意代码自动化同源判定方法[J]. 电子学报, 2016, 44(10): 2410-2414.
[6]Gandotra E, Bansal D, Sofat S. Malware analysis and classification: A survey[J]. Journal of Information Security, 2016, 5(2): 56-64.
[7]陈艳秋, 孙培立. 一种基于类别强信息特征和贝叶斯算法的中文文本分类器[J]. 计算机应用与软件, 2014(8): 330-333.
[8]Gotlieb C C, Kreyszig H E. Texture descriptors based on co-occurrence matrices[J]. Computer Vision, Graphics, and Image Processing, 1990, 51(1): 70-86.
[9]Kancherla K, Mukkamala S. Image visualization based malware detection[C]//2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS). IEEE, 2013: 40-44.
[10] 邓煜, 李明, 周稻祥. 基于两阶段随机森林的螺丝锁附结果判别研究[J]. 太原理工大学学报, 2020, 51(2): 198-205.
[11] Quentin Brabant, Miguel Couceiro, Didier Dubois, Henri Prade, Agnès Rico. Learning rule sets and Sugeno integrals for monotonic classification problemsEB/OL].[2020-02-13] https://doi.org/10.1016/j.fss.2020.01.006.
[12] 刘建花. K-means聚类算法的改进与应用[J]. 太原师范学院学报(自然科学版), 2020, 19(1): 81-83.
[13] 韩晓光, 曲武, 姚宣霞, 等. 基于纹理指纹的恶意代码变种检测方法研究[J]. 通信学报, 2014, 35(8): 125-136.
[14] 张晨斌, 张云春, 郑杨, 等. 基于灰度图纹理指纹的恶意软件分类[J]. 计算机科学, 2018, 45(6A): 383-386.