Liu Xin, Liu Ren-ren, and Wu Xiang-bo


  1. [1] W. Xin Zhi, S. Le Chang, Z. Min, and C. Tao, Maliciousbehavior detection method based on sequence pattern discovery,Computer Engineering, 37(24), 2011, 144–147.
  2. [2] Fei Sike technology R & D center, Delphi depth Windowscore programming (Beijing: Electronic Industry Press, 2003),256–265.
  3. [3] B. Jin Rong, W. Jun Feng, Z. Zong Qu, and L. Da Fu,The sensitive native API-based malware detection method,Computer Engineering, 38(13), 2012, 152–156.
  4. [4] Microsoft Corporation, MSDN Library for Visual Studio 2005[EB/OL], 2004.
  5. [5] M. De Cao, The Windows kernel scenario analysis – usingopen source code ReactOS (upper and lower volumes) (Beijing:Electronic Industry Press, 2009), 433–442.
  6. [6] J. Hui, Y. Feng, and D. Hai Xin, Rootkit hidden technologyand detection methods research, Mini-Micro Systems, 33(5),2012, 58–62.
  7. [7] Z. Fan and C.-C. Shi, Driven development techniques explain(Beijing: Electronic Industry Press, 2008), 351–358.
  8. [8] M.A. Rajab and A. Terzis, On the effectiveness of distributedworm monitoring, Proc. 14th USENIX Security Symposium,Baltimore, 2005, 124–130.
  9. [9] S.T. King and P.M. Chen, Implementing malware with vir-tual machines, IEEE Symposium on Security and Privacy,California, 2006, 212–220.
  10. [10] G. Gu, et al., BotHunter: Detecting malware infection throughIDS-driven dialog correlation, Proc of 16th USENIX SecuritySymposium, Boston, 2007, 224–230.

Important Links:

Go Back