|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3452 occurrences of 1510 keywords
|
|
|
Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
78 | EunYoung Kim, CheolHo Lee, HyungGeun Oh, JinSeok Lee |
The System Modeling for Detections of New Malicious Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARA ![In: Applied Parallel Computing, State of the Art in Scientific Computing, 7th International Workshop, PARA 2004, Lyngby, Denmark, June 20-23, 2004, Revised Selected Papers, pp. 992-999, 2004, Springer, 3-540-29067-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Realtime monitoring, Malicious Code |
67 | Jiang Wang 0008, Anup K. Ghosh, Yih Huang |
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 24-33, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web browser security, honey client, virtualization, botnets, spyware, malicious code |
58 | Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch |
Measurement Study on Malicious Web Servers in the .nz Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 8-25, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Wan-Hui Tseng, Chin-Feng Fan |
Handling Malicious Code on Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 68-74, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
control systems security, malicious code classification, undecidability |
52 | Sinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang |
Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing ![In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 89-102, 2008, Springer, 978-3-540-70559-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Jia Zhang 0004, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu |
AMCAS: An Automatic Malicious Code Analysis System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 501-507, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Robert Moskovitch, Nir Nissim, Yuval Elovici |
Malicious Code Detection Using Active Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 74-91, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Robert Moskovitch, Clint Feher, Yuval Elovici |
A Chronological Evaluation of Unknown Malcode Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 112-117, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unknown Malicious File Detection, Classification |
51 | Gregory J. Conti, Edward Sobiesk |
Malicious interface design: exploiting the user. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 271-280, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
adversarial interface design, evil interfaces, malicious interfaces, web usability guidelines, design principles |
51 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-DSMM ![In: Proceeding of the ACM First International Workshop on Data-Intensive Software Management and Mining, CIKM-DSMM 2009, Hong Kong, China, November 6, 2009, pp. 23-26, 2009, ACM, 978-1-60558-810-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
51 | Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin |
An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 364-371, 2008, Springer, 978-3-540-87440-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
self-relocation gene, finite-state machine, malicious code detection |
51 | Payman Mohassel, Matthew K. Franklin |
Efficiency Tradeoffs for Malicious Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 458-473, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation |
47 | Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 |
DROP: Detecting Return-Oriented Programming Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 163-177, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Wenjia Li, Anupam Joshi, Tim Finin |
Policy-Based Malicious Peer Detection in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 76-82, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo |
Data Mining Methods for Detection of New Malicious Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 38-49, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici |
Unknown Malcode Detection Using OPCODE Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 204-215, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OpCode, Classification, Malicious Code Detection |
46 | Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, Seungwan Han |
Malicious content filtering based on semantic features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 802-806, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious, naked, semantic, filtering |
46 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham |
A scalable multi-level feature extraction technique to detect malicious executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 33-45, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Malicious executable, n-gram analysis, Feature extraction, Disassembly |
46 | Yingxu Lai, Zenghui Liu |
Unknown Malicious Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Congress on Engineering (Selected Papers) ![In: Advances in Electrical Engineering and Computational Science, [revised and extended papers from the World Congress on Engineering, WCE 2008, London, UK, July 2-4, 2008], pp. 301-312, 2008, Springer, 978-90-481-2310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Unknown malicious detection, Half Increment Naive Bayes, classification |
46 | Tiago H. Kobayashi, Aguinaldo B. Batista, João Paulo S. Medeiros, José Macedo F. Filho, Agostinho M. Brito Jr., Paulo S. Motta Pires |
Analysis of Malicious Traffic in Modbus/TCP Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers, pp. 200-210, 2008, Springer, 978-3-642-03551-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Critical Information Infrastructure Protection, Malicious Traffic Analysis, Threats and Attacks to AT Infrastructures, Automation Technology Security |
46 | Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer |
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KI ![In: KI 2007: Advances in Artificial Intelligence, 30th Annual German Conference on AI, KI 2007, Osnabrück, Germany, September 10-13, 2007, Proceedings, pp. 44-50, 2007, Springer, 978-3-540-74564-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Service Provider (NSP), Machine Learning, Feature Selection, Malicious Code |
46 | Moshe Babaioff, Robert Kleinberg, Christos H. Papadimitriou |
Congestion games with malicious players. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), San Diego, California, USA, June 11-15, 2007, pp. 103-112, 2007, ACM, 978-1-59593-653-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malicious behavior, equilibrium, selfish routing, congestion games |
42 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici |
Unknown malcode detection and the imbalance problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(4), pp. 295-308, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Sintayehu Dehnie, Nasir D. Memon |
A Stochastic Model for Misbehaving Relays in Cooperative Diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 482-487, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Robert Moskovitch, Clint Feher, Yuval Elovici |
Unknown malcode detection - A chronological evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 267-268, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici |
Unknown malcode detection via text categorization and the imbalance problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 156-161, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Mingwu Zhang, Bo Yang 0003, Yu Qi, Wenzheng Zhang |
Using Trust Metric to Detect Malicious Behaviors in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 104-108, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Hiroaki Kikuchi, Masato Terada |
How Many Malicious Scanners Are in the Internet? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 381-390, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Sungsuk Kim, Chang Choi, Junho Choi, Pankoo Kim, Hanil Kim |
A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 567-576, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Ding Peng, Shi Jun, Sheng Huan Ye, Liming Li |
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-Commerce Agents ![In: E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand, pp. 191-205, 2001, Springer, 3-540-41934-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov |
Botzilla: detecting the "phoning home" of malicious software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1978-1984, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network intrusion detection, malicious software |
41 | Ahmed Obied, Reda Alhajj |
Fraudulent and malicious sites on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(2), pp. 112-120, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming |
41 | Zhe Fang, Minglu Li 0001, Chuliang Weng, Yuan Luo 0003 |
Dynamic Malicious Code Detection Based on Binary Translator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 80-89, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dynamic detection, binary translator, malicious code |
41 | Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1245-1254, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious web sites, supervised learning, L1-regularization |
41 | M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 121-141, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information |
41 | Xiang-he Yang, Huaping Hu, Xin Chen |
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 484-490, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure data forwarding, malicious routers detecting, communication security |
41 | Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
Malicious Code Detection Architecture Inspired by Human Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 312-317, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
System Call, Malicious Code Detection |
41 | Yingxu Lai |
A Feature Selection for Malicious Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 365-370, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unknown malicious detection, classification, SVM, feature selection |
41 | Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong |
An Automatic Meta-revised Mechanism for Anti-malicious Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 98-107, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious injection, Security gateway, Black box testing, Input validation |
41 | Jin-Cherng Lin, Jan-Min Chen |
An Automatic Revised Tool for Anti-Malicious Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 164, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Complete crawling, Malicious injection, Security, SQL Injection, Input validation |
41 | Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari |
New Malicious Code Detection Using Variable Length n-grams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 276-288, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Episodes, Data Mining, n-grams, Malicious code detection |
41 | Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen |
Assessment of Palm OS Susceptibility to Malicious Code Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 240-249, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mobile operating systems, Palm OS, worms, malicious code |
36 | Feng Li 0001, Jie Wu 0001 |
Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, USA, pp. 432-440, 2008, IEEE, 978-1-4244-1777-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Martin Gairing |
Malicious Bayesian Congestion Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAOA ![In: Approximation and Online Algorithms, 6th International Workshop, WAOA 2008, Karlsruhe, Germany, September 18-19, 2008. Revised Papers, pp. 119-132, 2008, Springer, 978-3-540-93979-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 391-395, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky |
Identification of malicious web pages through analysis of underlying DNS and web server relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 935-941, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jin-Cherng Lin, Jan-Min Chen |
The Automatic Defense Mechanism for Malicious Injection Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 709-714, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Claude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran |
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 19-26, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai |
Detecting Malicious Peers in Overlay Multicast Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 499-506, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Donggang Liu, Peng Ning, Wenliang Du |
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 609-619, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham |
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings, pp. 541-542, 2004, Springer, 3-540-24076-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Paul Ammann, Sushil Jajodia, Peng Liu 0005 |
Recovery from Malicious Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(5), pp. 1167-1185, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, transaction processing, assurance, database recovery |
36 | James A. Whittaker, Andres De Vivanco |
Neutralizing windows-based malicious mobile code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 242-246, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
API hooking, code signing, interrupt table, native code, worm, windows, wrapper, mobile code, virus, sandbox, Microsoft Windows |
36 | Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous |
Securing internet coordinate embedding systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007, pp. 61-72, 2007, ACM, 978-1-59593-713-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
internet coordinates-embedding systems, malicious behavior detection, network positioning systems, security, kalman filter |
36 | Tirthankar Ghosh, Niki Pissinou, S. Kami Makki |
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(6), pp. 985-995, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
collaborative trust-based routing, colluding malicious nodes, mobile ad hoc networks, secure communication |
35 | Andreas Dewald, Thorsten Holz, Felix C. Freiling |
ADSandbox: sandboxing JavaScript to fight malicious websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1859-1864, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dynamic analysis, malicious software, drive-by downloads |
35 | Peishun Liu, Xuefang Wang |
Identification of Malicious Web Pages by Inductive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 448-457, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious detection, generalization, specialization, inductive learning, drive-by downloads |
35 | Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma |
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 525-530, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
conditional jump, obfuscation, malicious codes, disassembly |
35 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 201-210, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
35 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 334-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
35 | George Karakostas, Anastasios Viglas |
Equilibria for networks with malicious users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 110(3), pp. 591-613, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious user, Equilibrium, Selfish routing, Saddle point |
35 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Using RS and SVM to Detect New Malicious Executable Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 574-579, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
support vector machine, Rough set, malicious code |
35 | Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue |
A tool for analyzing and detecting malicious mobile code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20-28, 2006, pp. 831-834, 2006, ACM, 1-59593-375-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
OS execution emulation, code simulation, static code analysis, malicious code detection |
35 | Yi Hu, Brajendra Panda |
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 13(3), pp. 269-291, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Malicious transactions, intrusion detection, anomaly detection, data dependency |
35 | Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann |
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 16-18 May 2005, Halifax, Novia Scotia, Canada, pp. 319-326, 2005, IEEE Computer Society, 0-7695-2333-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
malicious behaviour, networking, DHT, attacks, CAN |
35 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 7-18, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
35 | Yu Chen 0002, Yu-Kwong Kwok, Kai Hwang 0001 |
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 123-129, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
packet dropping policy, DDoS defense, malicious flows, duplicated ACKs, probing |
35 | Philippe Golle, Daniel H. Greene, Jessica Staddon |
Detecting and correcting malicious data in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 29-37, 2004, ACM, 1-58113-922-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
malicious node, data validation, location verification |
35 | Jeremy Z. Kolter, Marcus A. Maloof |
Learning to detect malicious executables in the wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 470-478, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, data mining, concept learning, malicious software |
35 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 76-82, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
35 | Erica Y. Yang, Jie Xu 0007, Keith H. Bennett |
Private Information Retrieval in the Presence of Malicious Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 805-812, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, fault tolerance, Distributed systems, secret sharing, privacy protection, private information retrieval, malicious failures |
35 | Klaus Echtle |
Avoiding Malicious Byzantine Faults by a New Signature Generation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings, pp. 106-123, 1999, Springer, 3-540-66483-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Malicious Byzantine Faults, Digital Signatures for Fault Tolerance, Agreement Protocols |
32 | Jiin-Chiou Cheng, Chi-Sung Laih |
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 37-48, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Conference key agreement, Modified Weil pairing, Fault-tolerance, Elliptic curve |
32 | Eugene Santos Jr., Hien Nguyen 0001, Fei Yu 0002, Keum Joo Kim, Deqing Li, John Thomas Wilkinson, Adam Olson, Russell Jacob |
Intent-Driven Insider Threat Detection in Intelligence Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12, 2008, pp. 345-349, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta |
A study of malware in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 327-332, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
limewire, openFT, peer-to-peer, filtering, malware |
32 | Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan |
Fast Portscan Detection Using Sequential Hypothesis Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pp. 211-225, 2004, IEEE Computer Society, 0-7695-2136-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 281-290, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
31 | Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha |
Reconstruction of malicious internet flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1182-1187, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
flow reconstruction, distributed denial of service |
31 | George Theodorakopoulos 0001, John S. Baras |
Game Theoretic Modeling of Malicious Users in Collaborative Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 26(7), pp. 1317-1327, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Nan Zhang 0004, Wei Zhao 0001 |
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(8), pp. 1028-1033, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Sheng Zhong 0002, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao |
Towards a Theory of Robust Localization Against Malicious Beacon Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1391-1399, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Zesheng Chen, Chuanyi Ji, Paul Barford |
Spatial-Temporal Characteristics of Internet Malicious Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 2306-2314, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Murat Kantarcioglu, Onur Kardes |
Privacy-Preserving Data Mining Applications in the Malicious Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), October 28-31, 2007, Omaha, Nebraska, USA, pp. 717-722, 2007, IEEE Computer Society, 0-7695-3033-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Mihai Christodorescu, Somesh Jha, Christopher Kruegel |
Mining specifications of malicious behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 5-14, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behavior-based detection, malspec, differential analysis |
31 | Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang |
Malicious Codes Detection Based on Ensemble Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 468-477, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jongoh Choi, Si-Ho Cha, JooSeok Song |
An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 179-193, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 10, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization |
31 | Yajie Zhu, Tai Xin, Indrakshi Ray |
Recovering from Malicious Attacks in Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 14-23, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Teck Sung Yap, Hong Tat Ewe |
A Mobile Phone Malicious Software Detection Model with Behavior Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet ![In: Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings, pp. 57-65, 2005, Springer, 3-540-27830-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith |
Detecting Malicious Code by Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pp. 174-187, 2005, Springer, 3-540-26613-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Model Checking, Malware Detection |
31 | Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran |
Collective Endorsement and the Dissemination Problem in Malicious Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 527-536, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Mike Just, Evangelos Kranakis, Tao Wan 0004 |
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, ADHOC-NOW 2003 Montreal, Canada, October 8-10, 2003, Proceedings, pp. 151-163, 2003, Springer, 3-540-20260-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols |
31 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 251-256, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Wenguang Chen, Weimin Zheng, Guangwen Yang |
On the Malicious Participants Problem in Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 839-848, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Rocco A. Servedio |
Smooth Boosting and Learning with Malicious Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLT/EuroCOLT ![In: Computational Learning Theory, 14th Annual Conference on Computational Learning Theory, COLT 2001 and 5th European Conference on Computational Learning Theory, EuroCOLT 2001, Amsterdam, The Netherlands, July 16-19, 2001, Proceedings, pp. 473-489, 2001, Springer, 3-540-42343-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Yalin Evren Sagduyu, Anthony Ephremides |
A game-theoretic analysis of denial of service attacks in wireless random access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(5), pp. 651-666, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks |
31 | Nguyen-Thanh Nhan, Insoo Koo |
A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009, Proceedings, pp. 698-707, 2009, Springer, 978-3-642-04019-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious user, Distributed, Cognitive radio, Robust statistics, Spectrum sensing |
31 | Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim |
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 402-403, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious users, detection, insider threat, misuse |
31 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 214-225, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
31 | Nicolò Cesa-Bianchi, Eli Dichterman, Paul Fischer, Eli Shamir 0001, Hans Ulrich Simon |
Sample-Efficient Strategies for Learning in the Presence of Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 46(5), pp. 684-719, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
learning with malicious noise, PAC learning |
Displaying result #1 - #100 of 7297 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|