The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
177Yan Zhou, W. Meador Inge Malware detection using adaptive data compression. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF statistical data compression, machine learning, malware detection
162Chaoting Xuan, John A. Copeland, Raheem A. Beyah Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic Analysis, Emulator, Rootkit
156V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar Signature Generation and Detection of Malware Families. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Static Analysis, Malware Detection, Signature Generation
146Xin Hu 0001, Tzi-cker Chiueh, Kang G. Shin Large-scale malware indexing using function-call graphs. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF graph similarity, malware indexing, multi-resolution indexing
146Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray A semantics-based approach to malware detection. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF abstract interpretation, obfuscation, Malware detection, trace semantics
132Amit Vasudevan MalTRAK: Tracking and Eliminating Unknown Malware. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
130Ashkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh Malware detection based on mining API calls. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF API call, polymorphic/metamorphic malware, portable executable (PE), public dataset, frequent pattern mining, malware detection
126Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee Ether: malware analysis via hardware virtualization extensions. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unpacking, virtualization, dynamic analysis, emulation, malware analysis
126Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray A semantics-based approach to malware detection. Search on Bibsonomy POPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF abstract interpretation, obfuscation, malware detection, trace semantics
121Lei Liu 0021, Songqing Chen Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
120M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq Embedded Malware Detection Using Markov n-Grams. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
116Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF virtual machines, malware detection, rootkits
116Amit Vasudevan, Ramesh Yerraballi SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. Search on Bibsonomy ACSC The full citation details ... 2006 DBLP  BibTeX  RDF security, instrumentation, malware
116Mihai Christodorescu, Somesh Jha Testing malware detectors. Search on Bibsonomy ISSTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malware, obfuscation, adaptive testing, anti-virus
111Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala Fragmented malware through RFID and its defenses. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
111Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser 0001, Helmut Veith Software transformations to improve malware detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
111Amit Vasudevan, Ramesh Yerraballi Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
111Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 Back to the Future: A Framework for Automatic Malware Removal and System Repair. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
110Boris Rozenberg, Ehud Gudes, Yuval Elovici A Distributed Framework for the Detection of New Worm-Related Malware. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware propagation, collaborative detection, malware detection
108Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni How Good Are Malware Detectors at Remediating Infected Systems?. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software testing, Malware, malware detection
105Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta A study of malware in peer-to-peer networks. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF limewire, openFT, peer-to-peer, filtering, malware
102Mihai Christodorescu, Somesh Jha, Christopher Kruegel Mining specifications of malicious behavior. Search on Bibsonomy ISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavior-based detection, malspec, differential analysis
102Mihai Christodorescu, Somesh Jha, Christopher Kruegel Mining specifications of malicious behavior. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behavior-based detection, malspec, differential analysis
102Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
101Mengjun Xie, Zhenyu Wu, Haining Wang HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
101José M. Fernandez 0001, Pierre-Marc Bureau Optimising malware. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
101Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant Semantics-Aware Malware Detection. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
100Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
99Yean Li Ho, Swee-Huay Heng Mobile and ubiquitous malware. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile malware, mobile virus, mobile worm, ubiquitous malware, mobile phone, PDA, smartphone, mobile security, cellphone
96Jusuk Lee, Kyoochang Jeong, Heejo Lee Detecting metamorphic malwares using code graphs. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code graph, metamorphic malware, static analysis, code obfuscation
95Yurong Song, Guoping Jiang Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks. Search on Bibsonomy Complex (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware propagation, neighborhood saturation, MAC mechanism, wireless sensor networks, model, cellular automata, theoretical analysis
95S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq Malware detection using statistical analysis of byte-level file content. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer malware, data mining, forensics
95Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq IMAD: in-execution malware analysis and detection. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF classification, malware, system call
95Shih-Yao Dai, Sy-Yen Kuo MAPMon: A Host-Based Malware Detection Tool. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor
95Jedidiah R. Crandall, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Temporal search: detecting hidden malware timebombs with virtual machines. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, malware, worms
91Matthew Hayes, Andrew Walenstein, Arun Lakhotia Evaluation of malware phylogeny modelling systems using automated variant generation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
91Gérard Wagener, Radu State, Alexandre Dulaunoy Malware behaviour analysis. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
91Pierre-Marc Bureau, José M. Fernandez 0001 Optimising Networks Against Malware. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
91Guoning Hu, Deepak Venugopal A Malware Signature Extraction and Detection Method Applied to Mobile Networks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
91Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
91Eric Filiol Malware Pattern Scanning Schemes Secure Against Black-box Analysis. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
91Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
89Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
89Dmitriy Komashinskiy, Igor V. Kotenko Integrated Usage of Data Mining Methods for Malware Detection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Behavior-based malware detection, Data mining, Malware
89Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
85Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Malware, Honeypots
81Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee Automatic Reverse Engineering of Malware Emulators. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
81Qinghua Zhang, Douglas S. Reeves MetaAware: Identifying Metamorphic Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Andreas Moser, Christopher Kruegel, Engin Kirda Limits of Static Analysis for Malware Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung Disassembled code analyzer for malware (DCAM). Search on Bibsonomy IRI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen VirusMeter: Preventing Your Cellphone from Spies. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile malware, mobile device security, anomaly detection, power consumption
75Yanfang Ye 0001, Tao Li 0001, Yong Chen, Qingshan Jiang Automatic malware categorization using cluster ensemble. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF malware categorization, signature, cluster ensemble
75Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat Static CFG analyzer for metamorphic Malware code. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence
75Yanfang Ye 0001, Tao Li 0001, Qingshan Jiang, Zhixue Han, Li Wan Intelligent file scoring system for malware detection from the gray list. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gray list, ensemble, malware detection
73Najwa Aaraj, Anand Raghunathan, Niraj K. Jha Dynamic Binary Instrumentation-Based Framework for Malware Defense. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware
73Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
70Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Sohraab Soltani, Syed A. Khayam, Hayder Radha Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70John V. Harrison Enhancing Network Security By Preventing User-Initiated Malware Execution. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Security, Computer Security, Malicious Software, Operating System Security
66Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq A Sense of 'Danger' for Windows Processes. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF API Call Sequence, Artificial Immune System, Malware Detection, Dendritic Cell Algorithm
66Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda Dynamic Analysis of Malicious Code. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Virus worm, Static analysis, Analysis, Dynamic analysis, API, Malware
64Ulrich Bayer, Engin Kirda, Christopher Kruegel Improving the efficiency of dynamic malware analysis. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic analysis, malware analysis
64Liang Xie 0002, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu pBMDS: a behavior-based malware detection system for cellphone devices. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF behavior learning, cellphone malware, system call
64Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma 0004, Jiaxin Zou Metamorphic malware detection technology based on aggregating emerging patterns. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, software security, system call, emerging patterns
61Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter AGIS: Towards automatic generation of infection signatures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Thomas Raffetseder, Christopher Krügel, Engin Kirda Detecting System Emulators. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Matt Webster, Grant Malcolm Detection of metamorphic and virtualization-based malware using algebraic specification. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion Architecture of a morphological malware detector. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Hoai-Nam Nguyen, Yoichi Shinoda A novel analytical framework to model malware diffusion in heterogeneous wireless networks. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Hahnsang Kim, Joshua Smith, Kang G. Shin Detecting energy-greedy anomalies and mobile malware variants. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF power consumption history, power signature
60P. Kumar Manna, Sanjay Ranka, Shigang Chen Analysis of Maximum Executable Length for Detecting Text-Based Malware. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Roberto Perdisci, Andrea Lanzi, Wenke Lee McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Andreas Moser, Christopher Krügel, Engin Kirda Exploring Multiple Execution Paths for Malware Analysis. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling The Nepenthes Platform: An Efficient Approach to Collect Malware. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Danilo Bruschi, Lorenzo Martignoni, Mattia Monga Detecting Self-mutating Malware Using Control-Flow Graph Matching. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55William Enck, Machigar Ongtang, Patrick D. McDaniel On lightweight mobile phone application certification. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile phone security, malware, android
55Ha Jin Hwang An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware, virus, spyware, Rootkit
54Keehyung Kim, Byung Ro Moon Malware detection based on dependency graph using hybrid genetic algorithm. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF genetic algorithm, dependency graph, malware detection, subgraph isomorphism
54Wei Yan, Erik Wu Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. Search on Bibsonomy Complex (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, cloud computing, malware, anti-virus
54Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh Automatic Generation of String Signatures for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation
54Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Execution Patterns in Automatic Malware and Human-Centric Attacks. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model, evaluation, IDS, Attack, malware
54Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera MAISim: mobile agent malware simulator. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings
54Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye IMDS: intelligent malware detection system. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OOA mining, PE file, windows API sequence, malware
51Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov Botzilla: detecting the "phoning home" of malicious software. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network intrusion detection, malicious software
51Yong-Joon Park, Zhao Zhang, Songqing Chen Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Andrew Brown 0005, Mark Ryan 0001 Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski Detecting Stealth Software with Strider GhostBuster. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Amit Vasudevan, Ramesh Yerraballi Stealth Breakpoints. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan Enhancing web browser security against malware extensions. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Stanley J. Barr, Samuel J. Cardman, David M. Martin A boosting ensemble for the recognition of code sharing in malware. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Brett Stone-Gross, Christo Wilson, Kevin C. Almeroth, Elizabeth M. Belding, Heather Zheng, Konstantina Papagiannaki Malware in IEEE 802.11 Wireless Networks. Search on Bibsonomy PAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Xuhua Ding, Wei Yu 0002, Ying Pan A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu 0003 Collecting Internet Malware Based on Client-side Honeypot. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee Eureka: A Framework for Enabling Static Malware Analysis. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Krishna K. Ramachandran, Biplab Sikdar 0001 On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan Extensible Web Browser Security. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Moses Garuba, Chunmei Liu, Alicia Nicki Washington A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan Expanding Malware Defense by Securing Software Installations. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Untrusted code, Software installation, Malicious code, Sandboxing
Displaying result #1 - #100 of 7276 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license