|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14 occurrences of 10 keywords
|
|
|
Results
Found 26 publication records. Showing 26 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Ge Cong, Mehmet Esser, Bahram Parvin, George Bebis |
Shape Metamorphism using p-Laplacian Equation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 15-18, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 235-248, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
44 | Ramkumar Chinchani, Eric van den Berg |
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 284-308, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Farooque Hassan Kumbhar, Syed Taha Ali |
Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIT ![In: International Conference on Frontiers of Information Technology, FIT 2023, Islamabad, Pakistan, December 11-12, 2023, pp. 166-171, 2023, IEEE, 979-8-3503-9578-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Rui Luo, Zihong Zhang, Wei Xiong |
Coupling Model Prediction of Fresh Grape Metamorphism in Cold Chain Transportation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 16th International Wireless Communications and Mobile Computing Conference, IWCMC 2020, Limassol, Cyprus, June 15-19, 2020, pp. 901-904, 2020, IEEE, 978-1-7281-3129-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Gewu Bu, Wassim Hana, Maria Potop-Butucaru |
E-IOTA: an efficient and fast metamorphism for IOTA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BRAINS ![In: 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, BRAINS 2020, Paris, France, September 28-30, 2020, pp. 9-16, 2020, IEEE, 978-1-7281-7091-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Tomoya Sasaki, MHD Yamen Saraiji, Charith Lasantha Fernando, Kouta Minamizawa, Masahiko Inami |
MetaLimbs: multiple arms interaction metamorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Emerging Technologies ![In: Special Interest Group on Computer Graphics and Interactive Techniques Conference, SIGGRAPH 2017, Los Angeles, CA, USA, July 30 - August 3, 2017, Emerging Technologies, pp. 16:1-16:2, 2017, ACM, 978-1-4503-5012-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray |
Unveiling metamorphism by abstract interpretation of code properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 577, pp. 74-97, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPREW@ACSAC ![In: Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015, pp. 6:1-6:11, 2015, ACM, 978-1-4503-3642-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Ludovic Brucker, Emmanuel P. Dinnat, Ghislain Picard, Nicolas Champollion |
Effect of Snow Surface Metamorphism on Aquarius L-Band Radiometer Observations at Dome C, Antarctica. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 52(11), pp. 7408-7417, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Keisuke Nakano 0001 |
Metamorphism in jigsaw. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Funct. Program. ![In: J. Funct. Program. 23(2), pp. 161-173, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Geoffroy Gueguen |
Van Wijngaarden Grammars and Metamorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 466-472, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Geoffroy Gueguen |
Van Wijngaarden grammars, metamorphism and K-ary malwares ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1009.4012, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
32 | Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray, Kevin Coogan, Gregg M. Townsend |
Modelling Metamorphism by Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis - 17th International Symposium, SAS 2010, Perpignan, France, September 14-16, 2010. Proceedings, pp. 218-235, 2010, Springer, 978-3-642-15768-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Kai Yang, Jonathan F. Huntington, Melissa A. Quigley, K. Scott, Peter Mason |
Mapping the effects of regional metamorphism and hydrothermal alteration in the Mount Isa Valley, Queensland, Australia, using airborne hyperspectral data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: 2003 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2003, Toulouse, France, July 21-15, 2003, pp. 1555-1557, 2003, IEEE, 0-7803-7929-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin |
Obfuscation: The Hidden Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(5), pp. 41-47, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
packer, metamorphism, computer security, polymorphism, malware, obfuscation |
29 | Eric Filiol, Grégoire Jacob, Mickaël Le Liard |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(1), pp. 23-37, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Black-box analysis, Metamorphism, Detection model, Polymorphism, Malware, Malware detection, Antivirus |
29 | Eric Filiol |
Formalisation and implementation aspects of K -ary (malicious) codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 75-86, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism |
22 | Pavel V. Zbitskiy |
Code mutation techniques by means of formal grammars and automatons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(3), pp. 199-207, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 391-395, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 289-298, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-level polymorphic shellcode detection using emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(4), pp. 257-274, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Wing Wong, Mark Stamp 0001 |
Hunting for metamorphic engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(3), pp. 211-229, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-Level Polymorphic Shellcode Detection Using Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings, pp. 54-73, 2006, Springer, 3-540-36014-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jeremy Gibbons |
Streaming Representation-Changers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MPC ![In: Mathematics of Program Construction, 7th International Conference, MPC 2004, Stirling, Scotland, UK, July 12-14, 2004, Proceedings, pp. 142-168, 2004, Springer, 3-540-22380-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Martin Erwig |
Categorical Programming with Abstract Data Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology, 7th International Conference, AMAST '98, Amazonia, Brasil, January 4-8, 1999, Proceedings, pp. 406-421, 1998, Springer, 3-540-65462-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #26 of 26 (100 per page; Change: )
|
|