Patrick Luckett, J. McDonald, W. Glisson, Ryan G. Benton, Joel A. Dawson, Blair A. Doyle
{"title":"Identifying stealth malware using CPU power consumption and learning algorithms","authors":"Patrick Luckett, J. McDonald, W. Glisson, Ryan G. Benton, Joel A. Dawson, Blair A. Doyle","doi":"10.3233/JCS-171060","DOIUrl":null,"url":null,"abstract":"This is a post-print version of this article to see the final version go to the following citation \nPatrick Luckett, J. Todd McDonald, William B. Glisson, Ryan Benton, Joel Dawson, Blair A. Doyle, \"Identifying stealth malware using CPU power consumption and learning algorithms\". Journal of Computer Security 26(2018) 589-613. DOI 10.3233/JCS-171060","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/JCS-171060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
This is a post-print version of this article to see the final version go to the following citation
Patrick Luckett, J. Todd McDonald, William B. Glisson, Ryan Benton, Joel Dawson, Blair A. Doyle, "Identifying stealth malware using CPU power consumption and learning algorithms". Journal of Computer Security 26(2018) 589-613. DOI 10.3233/JCS-171060
这是本文的打印后版本,查看最终版本请参见以下引用Patrick Luckett, J. Todd McDonald, William B. Glisson, Ryan Benton, Joel Dawson, Blair a . Doyle,“使用CPU功耗和学习算法识别隐形恶意软件”。计算机安全26(2018):589-613。DOI 10.3233 / jcs - 171060