|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 174 occurrences of 133 keywords
|
|
|
Results
Found 177 publication records. Showing 177 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
162 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 221-236, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
134 | Xin Zhou, Bo Xu 0018, Yaxuan Qi, Jun Li 0003 |
MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 256-261, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Virus Signatures, Performance, Algorithms, Pattern Matching, Anti-Virus |
114 | Ming Liu, Lansheng Han, Mengsong Zou, Qiwen Liu |
An Evaluating Model for Anti-virus Ability Based on AHP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (1) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 394-398, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
110 | Minh Nhat Quang Truong, Trong Nghia Hoang |
A Multi-agent Mechanism in Machine Learning Approach to Anti-virus System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 743-752, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Machine Learning, Multi-agent, Computer virus, Anti-virus |
98 | Kevin Davis |
Saving users from themselves: creating an effective student-oriented anti-virus intervention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 29th Annual ACM SIGUCCS Conference on User Services 2001, Portland, Oregon, USA, October 17-20, 2001, pp. 27-32, 2001, ACM, 1-58113-382-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
McAfee VirusScan, residential computing support, computer security, intervention, anti-virus, user services |
97 | Derek Uluski, Micha Moffie, David R. Kaeli |
Characterizing antivirus workload execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 90-98, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
89 | Arun Lakhotia, Moinuddin Mohammed |
Imposing Order on Program Statements to Assist Anti-Virus Scanners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 11th Working Conference on Reverse Engineering, WCRE 2004, Delft, The Netherlands, November 8-12, 2004, pp. 161-170, 2004, IEEE Computer Society, 0-7695-2243-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Naomi Fujimura, Itsuo Omagari, Masatsugu Ueda, Keiichi Irie |
Experience with software blanket contract in Kyushu University. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 307-310, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-virus software, campus agreement, software license, CSR |
85 | Sébastien Josse |
How to Assess the Effectiveness of your Anti-virus? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(1), pp. 51-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
81 | Tao Gong, Zixing Cai |
Tri-tier Immune System in Anti-virus and Software Fault Diagnosis of Mobile Immune Robot Based on Normal Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 51(2), pp. 187-201, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Normal model, Immune robot, Fault diagnosis, Artificial immune system, Anti-virus |
75 | Yanfang Ye 0001, Tao Li 0001, Qingshan Jiang, Zhixue Han, Li Wan |
Intelligent file scoring system for malware detection from the gray list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1385-1394, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
gray list, ensemble, malware detection |
72 | Chenxi Wang, John C. Knight, Matthew C. Elder |
On Computer Viral Infection and the Effect of Immunization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 246-256, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization |
71 | Tsern-Huei Lee |
Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 792-797, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 724-728, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
64 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(4), pp. 283-293, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 323-334, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Matt Webster, Grant Malcolm |
Formal affordance-based models of computer virus reproduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 289-306, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Takeshi Okamoto, Yoshiteru Ishida |
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: The Fourth International Symposium on Autonomous Decentralized Systems, ISADS 1999, Tokyo, Japan, March 20-23, 1999, pp. 328-331, 1999, IEEE Computer Society, 0-7695-0137-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
52 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Biologically Inspired Computer Virus Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioADIT ![In: Biologically Inspired Approaches to Advanced Information Technology, First International Workshop, BioADIT 2004, Lausanne, Switzerland, January 29-30, 2004. Revised Selected Papers, pp. 153-165, 2004, Springer, 3-540-23339-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Kevin Deeb, Steven Lewis |
A Biological Approach to the Development of Computer Autoimmune Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 13th International Symposium, ISMIS 2002, Lyon, France, June 27-29, 2002, Proceedings, pp. 514-525, 2002, Springer, 3-540-43785-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye |
IMDS: intelligent malware detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 1043-1047, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
OOA mining, PE file, windows API sequence, malware |
45 | Urs E. Gattiker |
EICAR 2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(4), pp. 45-48, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EICAR 2005, European Institute Center for Anti-Virus Research |
45 | John Aycock, Ken Barker 0001 |
Viruses 101. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 152-156, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anti-virus software, university course, malware, computer viruses |
43 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Artificial Immune System against Viral Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part II, pp. 499-506, 2004, Springer, 3-540-22115-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | John Aycock, Rennie deGraaf, Michael J. Jacobson Jr. |
Anti-disassembly using Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(1), pp. 79-85, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Code armoring, Reverse-engineering, Hash function, Virus, Disassembly |
37 | Yi-xuan Liu, Xiao-chun Yun, Bailing Wang, Hai-bin Sun |
An Anti-worm with Balanced Tree Based Spreading Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: Advances in Machine Learning and Cybernetics, 4th International Conference, ICMLC 2005, Guangzhou, China, August 18-21, 2005, Revised Selected Papers, pp. 652-661, 2005, Springer, 3-540-33584-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004, pp. 83-93, 2004, ACM Press, 1-58113-970-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
34 | Lequan Min, Yongan Ye, Shubiao Gao |
Classifications of Liver Diseases from Medical Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2008, 5th International Symposium on Neural Networks, ISNN 2008, Beijing, China, September 24-28, 2008, Proceedings, Part II, pp. 439-448, 2008, Springer, 978-3-540-87733-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hepatitis, liver medical digital images, classifications |
34 | Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan |
N-Gram-Based Detection of New Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Workshop Papers, pp. 41-42, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Glenda Tan Hui En, Koay Tze Erhn, Bingquan Shen |
Anti-virus Autobots: Predicting More Infectious Virus Variants for Pandemic Prevention through Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.14854, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim |
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1104.1070, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
32 | Xi Zhang 0005, Debanjan Saha, Hsiao-Hwa Chen |
Analysis of virus and anti-virus spreading dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November - 2 December 2005, pp. 5, 2005, IEEE, 0-7803-9414-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Qiang Hu, Xi Zhang, Debanjan Saha |
Modeling virus and anti-virus dynamics in topology-aware networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pp. 2077-2081, 2004, IEEE, 0-7803-8794-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Harold Joseph Highland |
Datacrime virus and new anti-virus products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 8(8), pp. 659-661, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
32 | Ian Castle, Eimear Buckley |
The Automatic Discovery, Identification and Measurement of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 127-132, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 108-125, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Amit Vasudevan |
MalTRAK: Tracking and Eliminating Unknown Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 311-321, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici |
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 202-209, 2007, IEEE, 1-4244-0705-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici |
Improving the Detection of Unknown Computer Worms Activity Using Active Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KI ![In: KI 2007: Advances in Artificial Intelligence, 30th Annual German Conference on AI, KI 2007, Osnabrück, Germany, September 10-13, 2007, Proceedings, pp. 489-493, 2007, Springer, 978-3-540-74564-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malcode Detection, Classification, Support Vector Machines, Active Learning |
32 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 178-197, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
Host Based Intrusion Detection using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 107-114, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Mark W. Bailey, Clark L. Coleman, Jack W. Davidson |
Defense against the dark arts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2008, Portland, OR, USA, March 12-15, 2008, pp. 315-319, 2008, ACM, 978-1-59593-799-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-virus software, compilers, computer science education, computer viruses |
29 | Ron Nichols, Karl Hassler |
Time To start charging for cleaning student computers? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 262-265, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cleanup, spyware, charging, anti-virus |
29 | Nancy P. Kutner |
Viruses, updates, and security: making the campus aware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 322-326, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anti-virus software, security, documentation, spam, firewalls, worms, E-mail, viruses |
29 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2004, Boston, Massachusetts, USA, July 11-14, 2004, pp. 34-44, 2004, ACM, 1-58113-820-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
29 | Yang Wang 0008, Chenxi Wang |
Modeling the effects of timing parameters on virus propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 61-66, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, epidemiology, computer virus, anti-virus |
29 | Wyman Miles |
A high-availability high-performance e-mail cluster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 84-88, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anti-spam, mail routing, cluster, redundancy, high-performance, proxy, high-availability, electronic mail, anti-virus, failover |
29 | Paul Schmehl |
Barbarians at the gateway, defeating viruses in EDU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 29th Annual ACM SIGUCCS Conference on User Services 2001, Portland, Oregon, USA, October 17-20, 2001, pp. 177-180, 2001, ACM, 1-58113-382-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
malicious programs, security, strategies, blocking, viruses, anti-virus, defenses |
29 | Li Ma 0011, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang |
An Online Automated Anti-anti-virus Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 351-362, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Lin Li, Linfeng Wei |
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberC ![In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019, Guilin, China, October 17-19, 2019, pp. 71-76, 2019, IEEE, 978-1-7281-2542-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Malware detection using statistical analysis of byte-level file content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 23-31, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computer malware, data mining, forensics |
25 | Yu Zhang 0003, Tao Li, Renchao Qin |
Computer Virus Evolution Model Inspired by Biological DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 943-950, 2008, Springer, 978-3-540-85983-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer virus evolution, biological DNA, artificial life |
25 | Abhishek Karnik, Suchandra Goswami, Ratan K. Guha |
Detecting Obfuscated Viruses Using Cosine Similarity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: First Asia International Conference on Modelling and Simulation, AMS 2007, Phuket, Thailand, March 27-30, 2007, pp. 165-170, 2007, IEEE Computer Society, 978-0-7695-2845-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 158, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
25 | Thomas Moscibroda, Stefan Schmid 0001, Roger Wattenhofer |
When selfish meets evil: byzantine players in a virus inoculation game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, July 23-26, 2006, pp. 35-44, 2006, ACM, 1-59593-384-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
byzantine nash equilibria, price of malice, virus propagation, game theory, price of anarchy, selfishness |
25 | Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach |
25 | Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida |
Malware phylogeny generation using permutations of code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 1(1-2), pp. 13-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
n-perms, evolution, permutation, Malware, worm, n-grams, virus, phylogeny, naming |
25 | James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy |
Inoculation strategies for victims of viruses and the sum-of-squares partition problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2005, Vancouver, British Columbia, Canada, January 23-25, 2005, pp. 43-52, 2005, SIAM, 0-89871-585-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 411-414, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
23 | Chandra Prakash |
B-tree with fixed node size and no minimum degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 211-219, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Byte, Prefix B-tree, String B-tree, B+-tree |
23 | Sébastien Josse |
Rootkit detection from outside the Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 113-123, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 142-157, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
23 | Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai |
Scalable Automaton Matching for High-Speed Deep Content Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 858-863, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
String matching, Hashing, Finite automata, Coprocessor, Content filtering |
23 | Keelan Cleary, Melissa E. Rycroft |
Putting out the fire before it starts: proactive technology support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 65-69, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
client communication, remote detection, backup, prevention |
20 | Jhonatan Tavori, Hanoch Levy |
Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pp. 1-5, 2023, IEEE, 978-1-6654-7716-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sakda Noinang, Maham Munawar, Muhammad Asif Zahoor Raja, Zulqurnain Sabir, Thongchai Botmart, Wajaree Weera, Prem Junsawang |
Numerical Assessments Employing Neural Networks for a Novel Drafted Anti-Virus Subcategory in a Nonlinear Fractional-Order SIR Differential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 114192-114202, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao |
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.14221, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat |
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 115, pp. 102627, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Jakub Pruzinec, Quynh Anh Nguyen, Adrian Baldwin, Jonathan Griffin, Yang Liu 0003 |
KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
A-TEST@ESEC/SIGSOFT FSE ![In: Proceedings of the 13th International Workshop on Automating Test Case Design, Selection and Evaluation, A-TEST 2022, Singapore, Singapore, November 17-18, 2022, pp. 37-44, 2022, ACM, 978-1-4503-9452-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Giuseppe Raffa, Daniele Sgandurra, Daniel O'Keeffe |
Evaluating Anti-Virus Effectiveness in Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 3071-3080, 2022, IEEE, 978-1-6654-8045-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao |
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 217-224, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yun-Da Tsai, Cheng-Kuan Chen, Shou-De Lin |
Toward an Effective Black-Box Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021, pp. 4165-4172, 2021, ACM, 978-1-4503-8446-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Jérémy Donadio, Guillaume Guérard, Soufian Ben Amor |
Collection of the Main Anti-Virus Detection and Bypass Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings, pp. 222-237, 2021, Springer, 978-3-030-92707-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Sung-Hwa Han, Hoo-Ki Lee, Gwang-Yong Gim, Sungjin Kim |
Empirical Study on Anti-Virus Architecture for Container Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 134940-134949, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Shinho Lee, Jungwoon Lee, Wonrak Lee, Seohyun Lee, Suyoung Kim, Eui Tak Kim |
Design of Integrated Messenger Anti-virus System using Chatbot Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2020, Jeju Island, Korea (South), October 21-23, 2020, pp. 1613-1615, 2020, IEEE, 978-1-7281-6758-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Noel Moses Dogonyaro, Victor Onomza Waziri, Abdulhamid Muhammad Shafii, Salisu Lukman Obada |
Comparative Performance Analysis of Anti-virus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTA ![In: Information and Communication Technology and Applications - Third International Conference, ICTA 2020, Minna, Nigeria, November 24-27, 2020, Revised Selected Papers, pp. 430-443, 2020, Springer, 978-3-030-69142-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Kacper Podbucki, Jakub Suder, Tomasz Marciniak, Adam Dabrowski |
CCTV based system for detection of anti-virus masks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPA ![In: Signal Processing: Algorithms, Architectures, Arrangements, and Applications, SPA 2020, Poznan, Poland, September 23-25, 2020, pp. 87-91, 2020, IEEE, 978-83-62065-39-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Ivica Stipovic |
Antiforensic techniques deployed by custom developed malware in evading anti-virus detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1906.10625, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates 0002, Daniel Kats, Lujo Bauer, Nicolas Christin |
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland, UK, May 04-09, 2019, pp. 78, 2019, ACM, 978-1-4503-5970-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Elsa Vera-Burgos, Willian Zamora, Homero Mendoza-Rodriguez, Alex Santamaría-Philco, Denise Vera-Navarrete, Patricia Quiroz-Palma |
Energy Consumption for Anti-virus Applications in Android OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Technology and Systems - Proceedings of ICITS 2019, Quito, Ecuador, 6-8 February 2019., pp. 335-345, 2019, Springer, 978-3-030-11889-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Jaehwan Lee 0001, Youngrang Kim, Ji Sun Shin |
In-Storage Anti-Virus System via On-Demand Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 101-D(8), pp. 2132-2135, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1806.04773, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Ignacio Martín 0001, José Alberto Hernández 0001, Sergio de los Santos |
SignatureMiner: A Fast Anti-Virus Signature Intelligence Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, May 30 - June 1, 2018, pp. 1-2, 2018, IEEE, 978-1-5386-4586-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: ALEC ![In: Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), Arlington, Virginia, USA, October 18-20, 2018., pp. 3-10, 2018, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 3-12, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Domhnall Carlin, Alexandra Cowan, Philip O'Kane, Sakir Sezer |
The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 17742-17752, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck |
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pp. 587-598, 2017, ACM, 978-1-4503-4944-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, Lorenzo Cavallaro |
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 14th International Conference on Mining Software Repositories, MSR 2017, Buenos Aires, Argentina, May 20-28, 2017, pp. 425-435, 2017, IEEE Computer Society, 978-1-5386-1544-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Tomer Cohen, Danny Hendler, Dennis Potashnik |
Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings, pp. 34-49, 2017, Springer, 978-3-319-60079-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Younsu Lee, Sang-Soo Choi, Jangwon Choi 0001, Jungsuk Song 0001 |
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017, pp. 5-9, 2017, IEEE Computer Society, 978-1-5386-2132-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Nir Nissim, Robert Moskovitch, Oren Bar-Ad, Lior Rokach, Yuval Elovici |
ALDROID: efficient update of Android anti-virus software using designated active learning methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 49(3), pp. 795-833, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck |
From Malware Signatures to Anti-Virus Assisted Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1610.06022, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
20 | Byungho Min, Vijay Varadharajan |
A novel malware for subversion of self-protection in anti-virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 46(3), pp. 361-379, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Zhenquan Cai, Roland H. C. Yap |
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 172-182, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Marco Gaudesi, Andrea Marcelli, Ernesto Sánchez 0001, Giovanni Squillero, Alberto Paolo Tonda |
Challenging Anti-virus Through Evolutionary Malware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoApplications (2) ![In: Applications of Evolutionary Computation - 19th European Conference, EvoApplications 2016, Porto, Portugal, March 30 - April 1, 2016, Proceedings, Part II, pp. 149-162, 2016, Springer, 978-3-319-31152-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon |
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 142-162, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Dae Wook Kim, Peiying Yan, Junjie Zhang 0004 |
Detecting fake anti-virus software distribution webpages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 49, pp. 95-106, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Chia-Nan Kao, Salim Si, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung |
Fast proxyless stream-based anti-virus for Network Function Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: Proceedings of the 1st IEEE Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015, pp. 1-5, 2015, IEEE, 978-1-4799-7899-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Adrian Tang, John Demme, Simha Sethumadhavan, Salvatore J. Stolfo |
A silicon anti-virus engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hot Chips Symposium ![In: 2015 IEEE Hot Chips 27 Symposium (HCS), Cupertino, CA, USA, August 22-25, 2015, pp. 1, 2015, IEEE, 978-1-4673-8885-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz 0001, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D. Joseph, J. Doug Tygar |
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015, pp. 45-56, 2015, ACM, 978-1-4503-3826-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 177 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|