Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
134 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1970-1977, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
112 | Yong-Joon Park, Zhao Zhang, Songqing Chen |
Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 20th IEEE International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2009, July 7-9, 2009, Boston, MA, USA, pp. 223-226, 2009, IEEE Computer Society, 978-0-7695-3732-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
112 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 13-27, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
109 | Keehyung Kim, Byung Ro Moon |
Malware detection based on dependency graph using hybrid genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, pp. 1211-1218, 2010, ACM, 978-1-4503-0072-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
genetic algorithm, dependency graph, malware detection, subgraph isomorphism |
36 | Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao |
How to Locate a Target Binary Process and Its Derivatives in System Emulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 273-276, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
system emulator, virtualization, instrumentation, malwares, multiprocessing |
25 | Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava 0001, Alireza Jolfaei |
Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(2), pp. 2434-2444, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Marais |
Améliorations des outils de détection de malwares par analyse statique grâce à des mécanismes d'intelligence artificielle. (Static analysis malware detection tools enhanced by artificial intelligence mechanisms). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
25 | Do Thi Thu Hien, The Duy Phan, Hao Le Anh, Lan Nguyen Duy, Nghi Hoang Khoa, Van-Hau Pham |
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoICT ![In: The 11th International Symposium on Information and Communication Technology, SoICT 2022, Hanoi, Vietnam, December 1-3, 2022, pp. 142-149, 2022, ACM, 978-1-4503-9725-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj |
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 116, pp. 102143, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | N. Saranya, V. Manikandan |
On viability of detecting malwares online using ensemble classification method with performance metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Intell. ![In: Comput. Intell. 36(3), pp. 1097-1112, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Ben Abdel Ouahab Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, Bouhorma Mohammed |
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NISS ![In: NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31 - April 2, 2020, pp. 20:1-20:6, 2020, ACM, 978-1-4503-7634-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo |
An Ensemble Learning Approach to Detect Malwares Based on Static Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (3) ![In: Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part III, pp. 676-686, 2020, Springer, 978-3-030-60247-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue |
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 2020 IEEE Security and Privacy Workshops, SP Workshops, San Francisco, CA, USA, May 21, 2020, pp. 126, 2020, IEEE, 978-1-7281-9346-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Louison Gitzinger |
Surviving the massive proliferation of mobile malware. (Survivre à la prolifération massive des malwares sur mobile). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
25 | Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee, Gia Nhu Nguyen |
An Ensemble Voted Feature Selection Technique for Predictive Modeling of Malwares of Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Syst. Model. Des. ![In: Int. J. Inf. Syst. Model. Des. 10(2), pp. 46-69, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Easwaramoorthy Arul, Venugopal Manikandan |
Dynamic runtime protection technique against the file system injecting malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 14(1/2), pp. 54-61, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee |
A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Mach. Learn. Cybern. ![In: Int. J. Mach. Learn. Cybern. 10(7), pp. 1893-1907, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Anand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar |
Anatomizing Android Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 26th Asia-Pacific Software Engineering Conference, APSEC 2019, Putrajaya, Malaysia, December 2-5, 2019, pp. 450-457, 2019, IEEE, 978-1-7281-4648-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Gabriel Bastos, Artur Marzano, Elverton C. Fazzion, Osvaldo L. H. M. Fonseca, Ítalo Cunha, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves |
Identificação Automática de Servidores C&C e Identificação de Variantes de Malwares Bashlite e Mirai. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC ![In: XXXVII Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2019, Gramado, RS, Brazil, May 6-10, 2019, pp. 721-734, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ben Abdel Ouahab Ikram, Bouhorma Mohammed, Boudhir Anouar Abdelhakim, Lotfi El Aachak, Bassam A. Zafar |
Machine learning application for malwares classification using visualization technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCA ![In: Proceedings of the 4th International Conference on Smart City Applications, SCA 2019, Casablanca, Morocco, October 02-04, 2019, pp. 110:1-110:6, 2019, ACM, 978-1-4503-6289-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Soussi Ilham, Abderrahim Ghadi, Boudhir Anouar Abdelhakim |
Deep learning for detecting Android malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCA ![In: Proceedings of the 4th International Conference on Smart City Applications, SCA 2019, Casablanca, Morocco, October 02-04, 2019, pp. 104:1-104:4, 2019, ACM, 978-1-4503-6289-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jiwon Hong, Sanghyun Park 0003, Sang-Wook Kim, Dongphil Kim, Wonho Kim |
Classifying malwares for identification of author groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 30(3), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Sidney Marlon Lopes de Lima, Heverton Kleidson de Lima Silva, João Henrique da Silva Luz, Samuel Lopes de Paula Silva, Hercília Juliana do Nascimento Lima, Anna Beatriz Augusta de Andrade, Alisson Marques da Silva |
Antivírus dotado de Rede Neural Artificial visando Detectar Malwares Preventivamente. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Braz. J. Inf. Syst. ![In: Braz. J. Inf. Syst. 11(4), pp. 31-62, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad 0001, Jong Weon Lee 0002, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Mahmood Awan, Irfan Mehmood |
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 69, pp. 828-841, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Danial Javaheri, Mehdi Hosseinzadeh 0001 |
A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 98(1), pp. 119-137, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yoshihiro Oyama |
Trends of anti-analysis operations of malwares observed in API call logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 14(1), pp. 69-85, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001, Angelo Spognardi |
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2018, pp. 7178164:1-7178164:30, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yu Liu 0004, Kai Guo, Xiangdong Huang, Zhou Zhou, Yichi Zhang |
Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 2018, pp. 1649703:1-1649703:12, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Suchul Lee, Sungho Kim, Sungil Lee, Jaehyuk Choi 0002, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee |
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 15(5), pp. 771-783, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Naoki Hashimoto, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura |
A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INNS Conference on Big Data ![In: INNS Conference on Big Data and Deep Learning 2018, Sanur, Bali, Indonesia, 17-19 April 2018, pp. 118-123, 2018, Elsevier. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Syed Fakhar Bilal, Saba Bashir, Farhan Hassan Khan, Haroon Rasheed |
Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTAP ![In: Intelligent Technologies and Applications - First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers, pp. 485-495, 2018, Springer, 978-981-13-6051-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | João M. Ceron, Cíntia B. Margi, Lisandro Z. Granville |
MARS: uma arquitetura para análise de malwares utilizando SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC Companion ![In: Companion Proceedings of the 36th Brazilian Symposium on Computer Networks and Distributed Systems, SBRC Companion 2018, Campos do Jordão, Brazil, May 6-10, 2018, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shay Nachum, Assaf Schuster, Opher Etzion |
Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings, pp. 227-242, 2018, Springer, 978-3-319-94146-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Mourad Leslous |
Highlight and execute suspicious paths in Android malware. (Mettre en avant et exécuter les chemins suspicieux dans les malwares Android). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
25 | Ali Shuja Siddiqui, Chia-Che Lee, Fareena Saqib |
Hardware based protection against malwares by PUF based access control mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: IEEE 60th International Midwest Symposium on Circuits and Systems, MWSCAS 2017, Boston, MA, USA, August 6-9, 2017, pp. 1312-1315, 2017, IEEE, 978-1-5090-6389-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001 |
Analysis of DDoS-Capable IoT Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FedCSIS ![In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, September 3-6, 2017., pp. 807-816, 2017, 978-83-946253-7-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Dong Shen, Xiaojing Su, Zhoujun Li 0001 |
HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings, pp. 199-214, 2017, Springer, 978-3-319-69470-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Sevil Sen, Ahmet Ilhan Aysan, John A. Clark |
SAFEDroid: Using Structural Features for Detecting Android Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATCS/SePrIoT@SecureComm ![In: Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings, pp. 255-270, 2017, Springer, 978-3-319-78815-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Soussi Ilham, Abderrahim Ghadi |
Detection and Classification of Malwares in Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCA ![In: Innovations in Smart Cities and Applications - Proceedings of the 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, October 15-27, 2017, pp. 188-199, 2017, Springer, 978-3-319-74499-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Shahrooz Pooryousef, Kazim Fouladi |
Proposing a New Feature for Structure-Aware Analysis of Android Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6-7, 2017, pp. 93-98, 2017, IEEE, 978-1-5386-6560-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Hiroaki Tanaka, Shingo Yamaguchi |
On modeling and simulation of the behavior of IoT malwares Mirai and Hajime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCE ![In: IEEE International Symposium on Consumer Electronics, ISCE 2017, Kuala Lumpur, Malaysia, November 14-15, 2017, pp. 56-60, 2017, IEEE, 978-1-5386-2189-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Xi Luo, Liming Wang, Zhen Xu 0009, Jing Yang, Mo Sun, Jing Wang |
DGASensor: Fast Detection for DGA-Based Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBN ![In: Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20 - 22, 2017, pp. 47-53, 2017, ACM, 978-1-4503-4861-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Fadi Mohsen, Halil Bisgin, Zachary Scott, Kyle Strait |
Detecting Android Malwares by Mining Statically Registered Broadcast Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIC ![In: 3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017, San Jose, CA, USA, October 15-17, 2017, pp. 67-76, 2017, IEEE Computer Society, 978-1-5386-2565-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | João Marcelo Ceron |
MARS: uma arquitetura para análise de malwares utilizando SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
25 | Lingling Zeng, Min Lei, Wei Ren 0002, Shiqi Deng |
Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan, South Korea, November 5-7, 2016., pp. 259-268, 2016, Springer, 978-3-319-49108-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Linhai Song, Heqing Huang, Wu Zhou, Wenfei Wu, Yiying Zhang 0005 |
Learning from Big Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSys ![In: Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys '16, Hong Kong, China, August 4-5, 2016, pp. 12:1-12:8, 2016, ACM, 978-1-4503-4265-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Guillaume Bonfante, Julien Oury Nogues |
Function Classification for the Retro-Engineering of Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers, pp. 241-255, 2016, Springer, 978-3-319-51965-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | K. P. Deepta, A. Salim |
Detecting Malwares Using Dynamic Call Graphs and Opcode Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACDS ![In: Advances in Computing and Data Sciences - First International Conference, ICACDS 2016, Ghaziabad, India, November 11-12, 2016, Revised Selected Papers, pp. 91-101, 2016, Springer, 978-981-10-5426-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Sun Hao, Wen Wang, Huabiao Lu, Peige Ren |
AutoMal: automatic clustering and signature generation for malwares based on the network flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(10), pp. 1845-1854, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Emre Aydogan, Sevil Sen |
Automatic Generation of Mobile Malwares Using Genetic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoApplications ![In: Applications of Evolutionary Computation - 18th European Conference, EvoApplications 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings, pp. 745-756, 2015, Springer, 978-3-319-16548-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Aurélien Thierry |
Désassemblage et détection de logiciels malveillants auto-modifiants. (Disassembly and detection of self-modifying malwares). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
25 | Ashu Sharma, Sanjay Kumar Sahay |
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1406.7061, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Umer Asgher, Fahad Moazzam Dar, Ali Hamza, Abdul Moeed Paracha |
Analysis of Increasing Malwares and Cyber Crimes Using Economic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1401.5178, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Integrated Framework for Classification of Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 417, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Dan Li, Chaoge Liu, Xu Cui, Xiang Cui |
Sniffing and propagating malwares through WPAD deception in LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pp. 1437-1440, 2013, ACM, 978-1-4503-2477-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Alan P. Sprague, Adam Rhodes, Gary Warner |
Using closed frequent sets to cluster malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAT ![In: XXIV International Symposium on Information, Communication and Automation Technologies, ICAT 2013, Sarajevo, Bosnia and Herzegovina, October 30 - November 1, 2013, pp. 1-4, 2013, IEEE Computer Society, 978-1-4799-0431-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Divyajyoti Das, Somesh Nanda |
Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 95-98, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed |
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Inf. Sci. ![In: Comput. Inf. Sci. 5(2), pp. 79-87, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Wenhua Luo, Na Li, Yanjun Tang |
Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. ![In: J. Softw. 7(8), pp. 1706-1712, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Mojtaba Eskandari, Sattar Hashemi |
A graph mining approach for detecting unknown malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Lang. Comput. ![In: J. Vis. Lang. Comput. 23(3), pp. 154-162, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert 0001, Azzam Mourad |
Towards Smart Anti-Malwares for Battery-Powered Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NTMS ![In: 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012, pp. 1-4, 2012, IEEE, 978-1-4673-0229-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Seyed Emad Armoun, Sattar Hashemi |
A General Paradigm for Normalizing Metamorphic Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIT ![In: 10th International Conference on Frontiers of Information Technology, FIT 2012, Islamabad, Pakistan, December 17-19, 2012, pp. 348-353, 2012, IEEE Computer Society, 978-1-4673-4946-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Geoffroy Gueguen |
Van Wijngaarden grammars, metamorphism and K-ary malwares ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1009.4012, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Hossein Rouhani Zeidanloo, Farzaneh Tabatabaei, Payam Vahdani Amoli, Atefeh Tajpour |
All About Malwares (Malicious Codes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 342-348, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Michal Szczepanik, Ireneusz J. Jozwiak |
Detecting Malwares in Honeynet Using a Multi-agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT (2) ![In: Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part II, pp. 396-401, 2010, Springer, 978-3-642-14305-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Michal Szczepanik, Ireneusz J. Józwiak |
Detecting New and Unknown Malwares Using Honeynet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MISSI ![In: Advances in Multimedia and Network Information System Technologies, MISSI 2010, pp. 173-180, 2010, Springer, 978-3-642-14988-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DETER ![In: DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
25 | Kazumasa Omote, Takeshi Shimoyama, Satoru Torii |
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers, pp. 125-138, 2007, Springer, 978-3-540-88652-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak |
Monitoring Smartphones for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 14(1), pp. 92-106, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
monitoring, anomaly detection, smartphones |
22 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 724-728, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
22 | Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao |
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 381-382, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
darknet monitoring, live network protection, alert system |
22 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1715-1721, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 201-210, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
22 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMTIC ![In: Wireless Networks, Information Processing and Systems, International Multi Topic Conference, IMTIC 2008, Jamshoro, Pakistan, April 11-12, 2008, Revised Selected Papers, pp. 400-411, 2008, Springer, 978-3-540-89852-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
22 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 221-236, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
22 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 442-447, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |