Citation: | LI Peng and WANG Ruchuan, “Research of Malicious Code Attack Effect Based on Synthetic Entropy Method,” Chinese Journal of Electronics, vol. 22, no. 3, pp. 449-454, 2013, |
LiuWeiwei, Shi Yong, Guo Yu, Han Zhen and Shen Changxiang, “A malicious code detection method based on integrated behavior characterization”, Electronica Sinica, Vo1.37, No.4, pp.696670, 2009. (in Chinese)
|
S. Mannor, R. Rubinstein, Y. Gat, “The cross-entropy method for fast policy search”, Proc. of the Twentieth International Conference on Machine Learning (ICML-2003), Washington DC, USA, pp.512-519, 2003.
|
M. Maher, L. Ronghui, D. Ngoduy, “Signal optimisation using the cross entropy method”, Transportation Research Part C: Emerging Technologies, Vol.19, No.6, pp.1-13, 2011.
|
S.L. Ho, Yang Shiyou, “The cross-entropy method and its application to inverse problems”, IEEE Transactions on Magnetics, Vol.46, No.8, pp.3401-3404, 2010.
|
Zhou Hong, Qiu Yue, “Application research on corporate default risk assessment based on cross-entropy algorithm”, Computer Engineering and Applications, Vol.44, No.20, pp.13-16, 2008. (in Chinese)
|
M. Celenkx, T. Conley, J. Willis and J. Graham, “Anomaly detection and visualization using Fisher discriminant clustering of network entropy”, Proc. of IEEE Third Int. Conf. Digital Information Management (ICDIM 2008), Aracaju, SE, Brazil, pp.216-220, 2008.
|
L. Ji, W. Binghong, W. Wenxu and Z. Tao, “Network entropy based on topology configuration and its computation to random networks”, Chinese Physics Letters, Vol.25, No.11, pp.41774180, 2008.
|
Wang Yi, Hu Hanping, Wang Zuxi and Chen Jianghang, “Measurement model for network security based on traffic attack determination”, Journal of Huazhong University of Science and Technology (Nature Science Edition), Vol.36, No.4, pp.37-40, 2008. (in Chinese)
|
Zhang Yirong, Xian Ming, Zhao Zhichao, Xiao Shunping and Wang Guoyu, “A study on the evaluation technology of the attack effect of computer networks”, Journal of National University of Defense Technology, Vol.24, No.5, pp.24-28, 2002. (in Chinese)
|
S.J. Hwang, K.H. Chen, “A proxy automatic signature scheme using a compiler in distributed systems for (unknown) virus detection”, Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), Taipei, China. Piscataway, NJ, USA, pp.649-654, 2005.
|
W. Jauhwang, S. Peter, F. Yishen, J. Lijing and L. Yuching, “Virus detection using data mining techinques”, Proc. of IEEE Annual International Carnahan Conference on Security Technology, Taiwan, China, pp.71-76, 14-16 Oct. 2003.
|
Li Peng, Wang Ruchuan, Gao Dehua, “Research on rootkit dynamic detection based on Fuzzy pattern recognition and support virtual machine technology”, Electronica Sinica, Vol.40, No.1, pp.115-120, 2012. (in Chinese)
|
P. Boer, D. Kroese, S. Mannor and R. Rubinstein, “A tutorial on the cross-entropy method”, Annals of Operation Research, Vol.134, No.1, pp.19-67, 2005.
|
P. Kroese, Y. Rubinstein, T. Taimre, “Application of the crossentropy method to clustering and vector quantization”, Journal of Global Optimization, Vol.37, No.1, pp.137-157, 2007.
|
C. Rao, “Entropy and cross entropy: Characterizations and applications”, The Legacy of Alladi Ramakrishnan in the Mathematical Sciences, Vol.3, No.1, pp.359-367, 2010.
|
Q. Qian, Che Hongyi, Z. Rui, “Entropy based method for network anomaly detection”, 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, China, pp.189-191, 2009.
|
J. Riihijarvi, M. Wellens, P. Mahonen, “Measuring complexity and predictability in networks with multiscale entropy analysis”, Proc. of IEEE INFOCOM, April 19-25, pp.1107-1115, 2009.
|
C. Cowan, P. Wagle, C. Pu, S. Beattie and J. Walpole, “Buffer overflows: Attacks and defenses for the vulnerability of the decade”, Proc. of the Foundations of Intrusion Tolerant Systems (OASIS'03), Farafra Oasis, Egypt, pp.227-237, 2003.
|
S. McClure, J. Scambray, G. Kurtz, “Hacking Exposed: Network Security Secrets and Solutions”, Fourth Edition, McGrawHill Osborne Media, pp.533-556, 2003.
|
A. Costa, D. Jones, D. Kroese, “Convergence properties of the cross-entropy method for discrete optimization”, Operations Research Letters, Vol.35, No.5, pp.573-580, 2007.
|
M. Markou, S. Singh, “Novelty detection: a review part 2: neural network based approaches”, Signal Processing, Vol.83, No.12, pp.2499-2521, 2003.
|
A. Mohamed, Mahfouz, M. Ismail, “Fuzzy relatives of the CLARANS algorithm with application to text clustering”, Proc. of World Academy of Science, Engineering and Technology, France, pp.334-341, 2009.
|