The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malcode with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2004 (21) 2005 (18) 2006-2007 (19) 2008-2013 (11)
Publication types (Num. hits)
article(7) inproceedings(57) phdthesis(1) proceedings(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 138 occurrences of 79 keywords

Results
Found 69 publication records. Showing 69 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
98Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis A Study of Malcode-Bearing Documents. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sandbox Diversity, Intrusion Detection, N-gram
89Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici Host Based Intrusion Detection using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Attila Ondi, Richard Ford Modeling malcode with Hephaestus: beyond simple spread. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hephaestus, code-red, virus-spread simulation
55Jan A. Bergstra, Alban Ponse A Bypass of Cohen's Impossibility Result. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Malcode, Program algebra, Worm, Virus, Thread algebra
44M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq Embedded Malware Detection Using Markov n-Grams. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44William Enck, Patrick D. McDaniel, Trent Jaeger PinUP: Pinning User Files to Known Applications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici Improving the Detection of Unknown Computer Worms Activity Using Active Learning. Search on Bibsonomy KI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malcode Detection, Classification, Support Vector Machines, Active Learning
31Markus Engelberth Social Malcode: benutzerabhängige Schadprogramme. Search on Bibsonomy 2013   RDF
31Zheng Shan, Haoran Guo, Jianmin Pang BTMD: A Framework of Binary Translation Based Malcode Detector. Search on Bibsonomy CyberC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici Unknown malcode detection and the imbalance problem. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Robert Moskovitch, Clint Feher, Yuval Elovici A Chronological Evaluation of Unknown Malcode Detection. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unknown Malicious File Detection, Classification
31Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici Unknown Malcode Detection Using OPCODE Representation. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OpCode, Classification, Malicious Code Detection
31Robert Moskovitch, Clint Feher, Yuval Elovici Unknown malcode detection - A chronological evaluation. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici Unknown malcode detection via text categorization and the imbalance problem. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Ken Dunham Source Code Implications for Malcode. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Farnam Jahanian (eds.) Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006 Search on Bibsonomy WORM The full citation details ... 2006 DBLP  BibTeX  RDF
31David M. Nicol The impact of stochastic variance on worm propagation and detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling, detection, worms, variance
31Niels Provos, Joe McClain, Ke Wang 0009 Search worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF index filtering, security, search, signature, internet worms
31Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
31Jose Nazario Where the worms aren't. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF securty, worms, vulnerabilities, botnets, exploits
31Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto Signature metrics for accurate and automated worm detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network worms, worm signatures, traffic analysis
31Xuxian Jiang, Dongyan Xu Profiling self-propagating worms via behavioral footprinting. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral footprinting, content signature, worm profiling, worms
31Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis On the impact of dynamic addressing on malware propagation. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private address space, network security, internet worms, network address translation
31Mohamed R. Chouchane, Arun Lakhotia Using engine signature to detect metamorphic malware. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metamorphic engine, virus scanner
31Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel A preliminary investigation of worm infections in a bluetooth environment. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth, malware, worms
31Giovanni Di Crescenzo, Faramak Vakil Cryptographic hashing for virus localization. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, virus tolerance, integrity verification, virus detection
31David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
31Ken Dunham Source Code Implications for Malcode. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Richard Ford Malcode Mysteries Revealed. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-replicating code, SQL.Slammer worm, worms, viruses
31Ibrahim K. El-Far, Richard Ford, Attila Ondi, Manan Pancholi Suppressing the Spread of Email Malcode using Short-term Message Recall. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Vijay Atluri, Angelos D. Keromytis (eds.) Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 Search on Bibsonomy WORM The full citation details ... 2005 DBLP  BibTeX  RDF
31Kurt Rohloff, Tamer Basar The detection of RCS worm epidemics. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Justin Ma, Geoffrey M. Voelker, Stefan Savage Self-stopping worms. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-stop, malware, worms, distributed protocols
31Milan Vojnovic, Ayalvadi J. Ganesh On the effectiveness of automatic patching. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates
31Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Worm evolution tracking via timing analysis. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF methods of attribution, network security, internet worms
31David J. Malan, Michael D. Smith 0001 Host-based detection of worms through peer-to-peer cooperation. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services
31Zesheng Chen, Chuanyi Ji A self-learning worm using importance scanning. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF importance scanning, self-learning worm, modeling, worm propagation
31David W. Richardson, Steven D. Gribble, Edward D. Lazowska The limits of global scanning worm detectors in the presence of background noise. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scanning worms, worm models, computer security, worm detection, computer worms
31Brian Hernacki Emerging threats. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, randomization, traffic analysis, internet worms
31Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Vern Paxson An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Mohammad Mannan, Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF instant messaging worms, scale-free networks
31Vern Paxson (eds.) Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 Search on Bibsonomy WORM The full citation details ... 2004 DBLP  BibTeX  RDF
31James E. Just, Mark R. Cornwell Review and analysis of synthetic diversity for breaking monocultures. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF diversity, vulnerability, n-version programming
31Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting A hybrid quarantine defense. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network modeling and simulation, worm detection systems, network security, worms
31Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
31Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia A behavioral approach to worm detection. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection
31Frank Castaneda, Emre Can Sezer, Jun Xu 0003 WORM vs. WORM: preliminary study of an active counter-attack mechanism. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-worm, good worm, worm
31Jintao Xiong ACT: attachment chain tracing scheme for email virus detection and control. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contact tracing, transmission chain, worm defense
31Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson Toward understanding distributed blackhole placement. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms
31Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang A study of mass-mailing worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, traffic analysis, internet worms
31Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson Preliminary results using scale-down to explore worm dynamics. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scaledown, slammer, simulation, modeling, worms
31Stuart Staniford, Stefan Savage (eds.) Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 Search on Bibsonomy WORM The full citation details ... 2003 DBLP  BibTeX  RDF
31Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
31Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
31Cliff Changchun Zou, Weibo Gong, Donald F. Towsley Worm propagation modeling and analysis under dynamic quarantine defense. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF dynamic quarantine, epidemic model, worm propagation
31Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
31Dan Ellis Worm anatomy and model. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network security, worm, network modeling, turing machine
31Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
31Yang Wang 0008, Chenxi Wang Modeling the effects of timing parameters on virus propagation. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, epidemiology, computer virus, anti-virus
31Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham A taxonomy of computer worms. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile malicious code, taxonomy, motivation, attackers, computer worms
31Darrell M. Kienzle, Matthew C. Elder Recent worms: a survey and trends. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF survey, malicious code
31Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand Experiences with worm propagation simulations. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF simulation, latency, bandwidth, internet worms
22Duc T. Ha, Hung Q. Ngo 0001 On the trade-off between speed and resiliency of Flash worms and similar malcodes. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel Noninvasive Methods for Host Certification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, Certification, malware, assurance
22Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo On the infeasibility of modeling polymorphic shellcode. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF shellcode, polymorphism, statistical models, signature generation
22Attila Ondi A drawback of current anti-virus simulations: the need for background traffic. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF background traffic, virus-spread simulation
22Adam J. O'Donnell, Harish Sethu Software Diversity as a Defense against Viral Propagation: Models and Simulations. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #69 of 69 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license