|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 74 occurrences of 55 keywords
|
|
|
Results
Found 172 publication records. Showing 172 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | Charles Higby, Michael Bailey |
Wireless security patch management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 165-168, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, wireless, configuration, update, worm, patch, virus, administration |
64 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Testing and evaluating virus detectors for handheld devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(2), pp. 135-147, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Karen Heyman |
New Attack Tricks Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(5), pp. 18-20, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
antivirus software, dynamic code obfuscation, DCO attacks |
57 | Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian |
Virtualized in-cloud security services for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiVirt ![In: Proceedings of the First Workshop on Virtualization in Mobile Computing, Breckenridge, CO, USA, June 17, 2008, pp. 31-35, 2008, ACM, 978-1-60558-328-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, malware detection, antivirus |
57 | Eric Filiol, Grégoire Jacob, Mickaël Le Liard |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(1), pp. 23-37, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Black-box analysis, Metamorphism, Detection model, Polymorphism, Malware, Malware detection, Antivirus |
57 | Doug Stinnette |
Attempts to automate client security at virginia commonwealth university. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 350, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
antivirus software, personal firewall |
48 | Ilir Gashi, Vladimir Stankovic 0002, Corrado Leita, Olivier Thonnard |
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 4-11, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AntiVirus detection engine analyis, cluster analysis, malware detection |
45 | Fu-Hau Hsu, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, Chieh-Wen Chen |
Antivirus Software Shield Against Antivirus Terminators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 7(5), pp. 1439-1447, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Joseph M. Murphy |
The water is wide: network security at Kenyon College, 1995-2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 237-240, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
student computing, resNet, antivirus |
39 | Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning |
Vulnerability Dependencies in Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 273-278, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | A. Badhusha, Seyed M. Buhari, Sahalu B. Junaidu, Haja Mohd Saleem |
Automatic Signature Files Update in Antivirus software Using Active Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 26-29 June 2001, Beirut, Lebanon, pp. 457-, 2001, IEEE Computer Society, 0-7695-1165-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Active networks, parallel virtual machine |
32 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Functional polymorphic engines: formalisation, implementation and use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(3), pp. 247-261, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Min Feng 0001, Rajiv Gupta 0001 |
Detecting virus mutations via dynamic matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 25th IEEE International Conference on Software Maintenance (ICSM 2009), September 20-26, 2009, Edmonton, Alberta, Canada, pp. 105-114, 2009, IEEE Computer Society, 978-1-4244-4897-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(12), pp. 21-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
Embedded Malware Detection Using Markov n-Grams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 88-107, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Derek Chi-Wai Pao, Xing Wang, Xiaoran Wang, Cong Cao, Yuesheng Zhu |
String Searching Engine for Virus Scanning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 60(11), pp. 1596-1609, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
antivirus system, embedded system, system security, String searching |
25 | Johnny Tsung Lin Ho, Guy G. Lemieux |
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 17th International Symposium on Field Programmable Gate Arrays, FPGA 2009, Monterey, California, USA, February 22-24, 2009, pp. 257-260, 2009, ACM, 978-1-60558-410-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fpga, pattern matching, regular expression, antivirus |
25 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 257-262, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
25 | Richard Ford |
The Wrong Stuff? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 86-89, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
detection, scaling, virus, macro, proactive, antivirus |
23 | Sidney M. L. de Lima, Danilo Souza, Ricardo Pinheiro, Sthéfano H. M. T. Silva, Petrônio Lopes, Rafael Lima, Jemerson Oliveira, Thyago de Amorim Monteiro, Sérgio M. M. Fernandes, Edison de Queiroz Albuquerque, Washington Wagner Azevedo da Silva, Wellington P. dos Santos |
Next-generation antivirus for JavaScript malware detection based on dynamic features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 66(2), pp. 1337-1370, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro |
How to Train your Antivirus: RL-based Hardening through the Problem-Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.19027, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Chunna Song, Jinfang Cheng, Guoqiu Zhang |
Network Security with Virtual Reality based Antivirus Protection and Reduced Detection Delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scalable Comput. Pract. Exp. ![In: Scalable Comput. Pract. Exp. 25(1), pp. 35-44, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Ritwik Murali, T. Palanisamy, C. Shunmuga Velayutham |
Evolving malware variants as antigens for antivirus systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 226, pp. 120092, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yue Zhao, Rebecca Slayton |
Tool, Doctor, and Hooligan: History of Antivirus Software in China, 1989-2010. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 45(1), pp. 43-54, January - March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Robert J. Joyce, Tirth Patel, Charles Nicholas, Edward Raff |
AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.06228, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas |
Bypassing antivirus detection: old-school malware, new tricks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.04149, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Sidney M. L. Lima, Sthéfano H. M. T. Silva, Ricardo Paranhos, Danilo Souza, Petrônio Lopes, Rafael Lima, Jemerson Oliveira, Thyago de Amorim Monteiro, Sérgio M. M. Fernandes, Edison de Queiroz Albuquerque, Washington Wagner Azevedo da Silva, Wellington P. dos Santos |
Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 27(3), pp. 1471-1491, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Maria Rigaki, Sebastian García |
Stealing and evading malware classifiers and antivirus at low false positive conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 129, pp. 103192, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Robert J. Joyce, Tirth Patel, Charles Nicholas, Edward Raff |
AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023, pp. 185-196, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas |
Bypassing antivirus detection: old-school malware, new tricks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 150:1-150:10, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Andrea Piccione, Giorgio Bernardinetti, Alessandro Pellegrini 0001, Giuseppe Bianchi 0001 |
Is Your Smartphone Really Safe? A Wake-up Call on Android Antivirus Software Effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), Bari, Italy, May 2-5, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Giorgio Bernardinetti, Dimitri Di Cristofaro, Giuseppe Bianchi 0001 |
Windows Antivirus Evasion Techniques: How to Stay Ahead of the Hooks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), Bari, Italy, May 2-5, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang 0002, Ferhat Erata, Song Han 0003, Yongshan Ding 0001, Jakub Szefer |
Design of Quantum Computer Antivirus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, San Jose, CA, USA, May 1-4, 2023, pp. 260-270, 2023, IEEE, 979-8-3503-0062-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marcus Botacin, Marco Antonio Zanata Alves, Daniela Oliveira 0001, André Grégio |
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 201, pp. 117083, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | V. G. Anisimov, E. G. Anisimov, T. N. Saurenko, V. P. Los' |
Performance Evaluation of Antivirus Systems for Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 56(8), pp. 883-887, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding 0001, Jakub Szefer |
Towards an Antivirus for Quantum Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.02649, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Robert J. Joyce, Edward Raff, Charles Nicholas |
Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.00757, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Ridvan Sahin |
Neutrosophic QUALIFLEX based on neutrosophic hesitancy index for selecting a potential antivirus mask supplier over COVID-19 pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 26(19), pp. 10019-10033, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sema Kayapinar Kaya, Dragan Pamucar, Ejder Aycin |
A New Hybrid Fuzzy Multi-Criteria Decision Methodology for Prioritizing the Antivirus Mask Over COVID-19 Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 33(3), pp. 545-572, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Michael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson |
Usability of Antivirus Tools in a Threat Detection Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings, pp. 306-322, 2022, Springer, 978-3-031-06974-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Christian Leka, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Vassilios S. Verykios |
A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IISA ![In: 13th International Conference on Information, Intelligence, Systems & Applications, IISA 2022, Corfu, Greece, July 18-20, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-6390-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ritwik Murali, C. Shunmuga Velayutham |
Adapting novelty towards generating antigens for antivirus systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9 - 13, 2022, pp. 1254-1262, 2022, ACM, 978-1-4503-9237-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Shay Sakazi, Yuval Elovici, Asaf Shabtai |
Prioritizing Antivirus Alerts on Internal Enterprise Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings, pp. 75-95, 2022, Springer, 978-3-031-09483-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding 0001, Jakub Szefer |
Towards an Antivirus for Quantum Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022, McLean, VA, USA, June 27-30, 2022, pp. 37-40, 2022, IEEE, 978-1-6654-8532-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Gulfam Shahzadi, Muhammad Akram 0001 |
Group decision-making for the selection of an antivirus mask under fermatean fuzzy soft information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 40(1), pp. 1401-1416, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Hassan Shah, Donna Marie Giselle Comissiong |
Computer Virus Model with Stealth Viruses and Antivirus Renewal in a Network with Fast Infectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 2(5), pp. 407, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Isao Nakajima, Kiyoshi Kurokawa, Seiji Morita, Yoshihide Nakagawa |
Basic Study on Scale-Free Networks and Targeted Antivirus Prophylaxis Supported by Information Communication Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. E Health Medical Commun. ![In: Int. J. E Health Medical Commun. 12(6), pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Miin-Shen Yang, Zeeshan Ali, Tahir Mahmood 0002 |
Complex q-Rung Orthopair Uncertain Linguistic Partitioned Bonferroni Mean Operators with Application in Antivirus Mask Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(2), pp. 249, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sidney M. L. Lima, Danilo Souza, Ricardo Paranhos, Sthéfano H. M. T. Silva, Petrônio Lopes, Rafael Lima, Jemerson Oliveira, Thyago de Amorim Monteiro, Sérgio M. M. Fernandes, Edison de Queiroz Albuquerque, Washington Wagner Azevedo da Silva, Wellington P. dos Santos |
Next generation antivirus endowed with bitwise morphological extreme learning machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 81, pp. 103724, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sidney M. L. de Lima, Heverton K. de L. Silva, João H. da S. Luz, Hercília J. do N. Lima, Samuel L. de P. Silva, Anna B. A. de Andrade, Alisson Marques da Silva |
Artificial intelligence-based antivirus in order to detect malware preventively. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Prog. Artif. Intell. ![In: Prog. Artif. Intell. 10(1), pp. 1-22, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Rana Muhammad Zulqarnain, Imran Siddique, Fahd Jarad, Rifaqat Ali, Thabet Abdeljawad |
Development of TOPSIS Technique under Pythagorean Fuzzy Hypersoft Environment Based on Correlation Coefficient and Its Application towards the Selection of Antivirus Mask in COVID-19 Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2021, pp. 6634991:1-6634991:27, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Osama Ellahi, Munam Ali Shah, Muhammad Usman Rana |
The ingenuity of malware substitution: Bypassing next-generation Antivirus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: 26th International Conference on Automation and Computing, ICAC 2021, Portsmouth, United Kingdom, September 2-4, 2021, pp. 1-5, 2021, IEEE, 978-1-86043-557-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, Theodora A. Varvarigou |
Hoplite Antivirus for Adversarial Attacks: A Theoretical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST ![In: Proceedings of the 17th International Conference on Web Information Systems and Technologies, WEBIST 2021, October 26-28, 2021, pp. 585-592, 2021, SCITEPRESS, 978-989-758-536-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis |
Transforming malicious code to ROP gadgets for antivirus evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 13(6), pp. 570-578, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Liang Bai, Yu Rao, Shiwei Lu, Xu Liu, Yiyi Hu |
The Software Gene-Based Test Set Automatic Generation Framework for Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. ![In: J. Softw. 14(10), pp. 449-456, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
23 | Mohammed I. Al-Saleh, Hanan M. Hamdan |
Precise Performance Characterization of Antivirus on the File System Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 25(9), pp. 1089-1108, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
23 | Chun Liu |
software descriptions from softpedia(antivirus and compress tool). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|
23 | Chun Liu |
software descriptions from softpedia(antivirus and compress tool). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|
23 | Chun Liu |
software descriptions from softpedia(antivirus and compress tool). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|
23 | Yolanda Varela, Ernesto Mario Padrón, Victoria Pérez |
Mecanismo de selección automática de firmas en ficheros ELF maliciosos para un motor antivirus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIbSE ![In: Proceedings of the XXII Iberoamerican Conference on Software Engineering, CIbSE 2019, La Habana, Cuba, April 22-26, 2019., pp. 673-680, 2019, Curran Associates, 978-1-5108-8795-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
23 | Eliana Giovannitti, Luca Mannella, Andrea Marcelli, Giovanni Squillero |
Evolutionary Antivirus Signature Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: IEEE Congress on Evolutionary Computation, CEC 2019, Wellington, New Zealand, June 10-13, 2019, pp. 928-935, 2019, IEEE, 978-1-7281-2153-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Ricardo Pinheiro, Sidney M. L. Lima, Sérgio Fernandes 0001, Edison de Queiroz Albuquerque, Sergio Medeiros, Danilo Souza, Thyago Monteiro, Petrônio Lopes, Rafael Lima, Jemerson Oliveira, Sthéfano H. M. T. Silva |
Next Generation Antivirus Applied to Jar Malware Detection based on Runtime Behaviors using Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2019, Porto, Portugal, May 6-8, 2019, pp. 28-32, 2019, IEEE, 978-1-7281-0350-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra |
A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019, pp. 456-465, 2019, ACM, 978-1-4503-7628-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Médéric Hurier |
Creating better ground truth to further understand Android malware: A large scale mining approach based on antivirus labels and malicious artifacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
23 | Sidney Marlon Lopes de Lima, Heverton Kleidson de Lima Silva, João Henrique da Silva Luz, Samuel Lopes de Paula Silva, Hercília Juliana do Nascimento Lima, Anna Beatriz Augusta de Andrade, Alisson Marques da Silva |
Antivírus dotado de Rede Neural Artificial visando Detectar Malwares Preventivamente. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Braz. J. Inf. Syst. ![In: Braz. J. Inf. Syst. 11(4), pp. 31-62, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ivan Zelinka, Swagatam Das, Lubomir Sikora, Roman Senkerik |
Swarm virus - Next-generation virus and antivirus paradigm? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Swarm Evol. Comput. ![In: Swarm Evol. Comput. 43, pp. 207-224, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ignacio Martín 0001, José Alberto Hernández 0001, Sergio de los Santos, Antonio Guzmán |
Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EISIC ![In: European Intelligence and Security Informatics Conference, EISIC 2018, Karlskrona, Sweden, October 24-25, 2018, pp. 7-14, 2018, IEEE, 978-1-5386-9400-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Dimitris Deyannis, Rafail Tsirbas, Giorgos Vasiliadis, Raffaele Montella, Sokol Kosta, Sotiris Ioannidis |
Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EdgeSys@MobiSys ![In: Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, EdgeSys@MobiSys 2018, Munich, Germany, June 10, 2018, pp. 13-18, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero |
Extended Abstract: Toward Systematically Exploring Antivirus Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 393-403, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed I. Al-Saleh, Rasha K. Al-Huthaifi |
On Improving Antivirus Scanning Engines: Memory On-Access Scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 13(8), pp. 290-300, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Hongwei Tang, Shengzhong Feng, Xiaofang Zhao, Yan Jin |
VirtAV: an Agentless Runtime Antivirus System for Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(11), pp. 5642-5670, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Pasha Shahegh, Tommy Dietz, Michel Cukier, Areej Algaith, Attila Brozik, Ilir Gashi |
AVAMAT: AntiVirus and malware analysis tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017, pp. 365-368, 2017, IEEE Computer Society, 978-1-5386-1465-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Yulia B. Grishunina, Larisa Manita |
Optimal Antivirus Protection Strategy in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACMPT ![In: Analytical and Computational Methods in Probability Theory - First International Conference, ACMPT 2017, Moscow, Russia, October 23-27, 2017, Proceedings, pp. 75-82, 2017, Springer, 978-3-319-71503-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jaehwan Lee 0001, Min Jae Jo, Ji Sun Shin |
LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 99-D(12), pp. 3185-3187, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Piyush Rumao |
Detect Malacious Executable(AntiVirus). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
DOI RDF |
|
23 | Areej Algaith, Ilir Gashi, Bertrand Sobesto, Michel Cukier, Selman Haxhijaha, Gazmend Bajrami |
Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN Workshops ![In: 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2016, Toulouse, France, June 28 - July 1, 2016, pp. 48-53, 2016, IEEE Computer Society, 978-1-5090-3688-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ignacio Martín 0001, José Alberto Hernández 0001, Sergio de los Santos, Antonio Guzmán |
POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1778-1780, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener |
AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016., 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Erkan Ersan, Lior Malka, Bruce M. Kapron |
Semantically Non-preserving Transformations for Antivirus Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers, pp. 273-281, 2016, Springer, 978-3-319-51965-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Alexey Sytnyakovski |
Softwareauswahl aus Konsumentensicht: eine multimethodale Untersuchung am Beispiel von Office- und Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
23 | Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi |
Scalable Testing of Mobile Antivirus Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 48(11), pp. 60-68, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Chenquan Gan, Xiaofan Yang |
Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Nonlinear Sci. Numer. Simul. ![In: Commun. Nonlinear Sci. Numer. Simul. 22(Issues), pp. 167-174, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Heqing Huang, Kai Chen 0012, Chuangang Ren, Peng Liu 0005, Sencun Zhu, Dinghao Wu |
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pp. 7-18, 2015, ACM, 978-1-4503-3245-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Vlasta Stavova, Vashek Matyas, Kamil Malinka |
The Challenge of Increasing Safe Response of Antivirus Software Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEMICS ![In: Mathematical and Engineering Methods in Computer Science - 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, Revised Selected Papers, pp. 133-143, 2015, Springer, 978-3-319-29816-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Bei Liu, Chuandong Li 0001 |
A New Virus-Antivirus Spreading Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN ![In: Advances in Neural Networks - ISNN 2015 - 12th International Symposium on Neural Networks, ISNN 2015, Jeju, South Korea, October 15-18, 2015, Proceedings, pp. 481-488, 2015, Springer, 978-3-319-25392-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis |
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 165-184, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 |
Measuring the health of antivirus ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 101-109, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | J. B. Shukla, Gaurav Singh, Poonam Shukla, Agraj Tripathi |
Modeling and analysis of the effects of antivirus software on an infected computer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 227, pp. 11-18, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Monire Norouzi, Saeed Parsa, Ali Mahjur |
A new approach for formal behavioral modeling of protection services in antivirus systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1406.2791, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Byungho Min, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens |
Antivirus security: naked during updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 44(10), pp. 1201-1222, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle |
Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PERSUASIVE ![In: Persuasive Technology - 9th International Conference, PERSUASIVE 2014, Padua, Italy, May 21-23, 2014. Proceedings, pp. 302-322, 2014, Springer, 978-3-319-07126-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Heqing Huang, Kai Chen 0012, Peng Liu 0005, Sencun Zhu, Dinghao Wu |
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (2) ![In: International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II, pp. 359-366, 2014, Springer, 978-3-319-23801-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Nguyen Kim Dien, Trung-Hieu Tran, Tran Ngoc Thinh |
Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDSE ![In: Future Data and Security Engineering - First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings, pp. 58-70, 2014, Springer, 978-3-319-12777-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Jameel Haffejee, Barry Irwin |
Testing antivirus engines to determine their effectiveness as a security layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: 2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3384-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Aziz Mohaisen, Omar Alrawi |
AV-Meter: An Evaluation of Antivirus Scans and Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 112-131, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Vasilis G. Tasiopoulos, Sokratis K. Katsikas |
Bypassing Antivirus Detection with Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Panhellenic Conference on Informatics ![In: 18th Panhellenic Conference on Informatics, PCI '14, Athens, Greece, October 2-4, 2014, pp. 16:1-16:2, 2014, ACM, 978-1-4503-2897-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall |
Antivirus performance characterisation: system-wide view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 7(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed I. Al-Saleh |
The impact of the antivirus on the digital evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 5(3/4), pp. 229-240, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Ilir Gashi, Bertrand Sobesto, Vladimir Stankovic 0002, Michel Cukier |
Does Malware Detection Improve with Diverse AntiVirus Products? An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security - 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings, pp. 94-105, 2013, Springer, 978-3-642-40792-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Ilir Gashi, Bertrand Sobesto, Stephen Mason, Vladimir Stankovic 0002, Michel Cukier |
A study of the relationship between antivirus regressions and label changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013, pp. 441-450, 2013, IEEE Computer Society, 978-1-4799-2366-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 172 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|