|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 868 occurrences of 557 keywords
|
|
|
Results
Found 2777 publication records. Showing 2777 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
138 | InSeon Yoo, Ulrich Ultes-Nitsche |
Non-signature based virus detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(3), pp. 163-186, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
106 | Xin Zhou, Bo Xu 0018, Yaxuan Qi, Jun Li 0003 |
MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 256-261, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Virus Signatures, Performance, Algorithms, Pattern Matching, Anti-Virus |
106 | Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin |
A Novel Immune Based Approach for Detection of Windows PE Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 4th International Conference, ADMA 2008, Chengdu, China, October 8-10, 2008. Proceedings, pp. 250-259, 2008, Springer, 978-3-540-88191-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer immune system, PE virus detection, relocation module, virus gene pool |
106 | Madihah Saudi, Nazean Jomhari |
Knowledge Structure on Virus for User Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 817-823, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload |
105 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 221-236, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
99 | John Case, Samuel E. Moelius |
Cautious virus detection in the extreme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 47-52, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
co-isolated sets, program self-reference, simple sets, virus detection, recursion theorems |
97 | Minh Nhat Quang Truong, Trong Nghia Hoang |
A Multi-agent Mechanism in Machine Learning Approach to Anti-virus System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 743-752, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Machine Learning, Multi-agent, Computer virus, Anti-virus |
93 | Ryuiti Koike, Naoshi Nakaya, Yuji Koi |
Development of System for the Automatic Generation of Unknown Virus Extermination Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2007 International Symposium on Applications and the Internet (SAINT 2007), 15-19 January 2007, Hiroshima, Japan, pp. 8, 2007, IEEE Computer Society, 0-7695-2756-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Lansheng Han, Shuxia Han, Bing Peng, Varney Washington |
Fuzzy Tracing the Source of Net-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFIE ![In: Fuzzy Information and Engineering, Proceedings of the Second International Conference of Fuzzy Information and Engineering, ICFIE 2007, May 13-16, 2007, Guangzhou, China, pp. 50-58, 2007, Springer, 978-3-540-71440-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Net-virus, fuzzy trace, network security |
88 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 41-48, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
84 | Ming Liu, Lansheng Han, Mengsong Zou, Qiwen Liu |
An Evaluating Model for Anti-virus Ability Based on AHP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (1) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 394-398, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Srilatha Attaluri, Scott McGhee, Mark Stamp 0001 |
Profile hidden Markov models and metamorphic virus detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(2), pp. 151-169, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Min Feng 0001, Rajiv Gupta 0001 |
Detecting virus mutations via dynamic matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 25th IEEE International Conference on Software Maintenance (ICSM 2009), September 20-26, 2009, Edmonton, Alberta, Canada, pp. 105-114, 2009, IEEE Computer Society, 978-1-4244-4897-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Aviezri S. Fraenkel |
Virus Versus Mankind. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, Second International Conference, CG 2000, Hamamatsu, Japan, October 26-28, 2000, Revised Papers, pp. 204-213, 2000, Springer, 3-540-43080-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
two-player cellular automata games, generalized Sprague-Grundy function |
75 | Yuji Watanabe, Hideki Imai |
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 118-135, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
72 | K. Najeeb, Vishnu Vardhan Reddy Konda, Siva Kumar Sastry Hari, V. Kamakoti 0001, Vivekananda M. Vedula |
Power Virus Generation Using Behavioral Models of Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 25th IEEE VLSI Test Symposium (VTS 2007), 6-10 May 2007, Berkeley, California, USA, pp. 35-42, 2007, IEEE Computer Society, 0-7695-2812-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Dynamic power dissipation, Power virus, Integer Constraint Solvers, Hardware Description Languages (HDL), Behavioral Models |
67 | Chenxi Wang, John C. Knight, Matthew C. Elder |
On Computer Viral Infection and the Effect of Immunization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 246-256, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization |
66 | Matt Webster, Grant Malcolm |
Formal affordance-based models of computer virus reproduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 289-306, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens |
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 790-800, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Arun Lakhotia, Moinuddin Mohammed |
Imposing Order on Program Statements to Assist Anti-Virus Scanners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 11th Working Conference on Reverse Engineering, WCRE 2004, Delft, The Netherlands, November 8-12, 2004, pp. 161-170, 2004, IEEE Computer Society, 0-7695-2243-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Matthew M. Williamson |
Design, Implementation and Test of an Email Virus Throttle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 76-85, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
64 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
On Abstract Computer Virology from a Recursion Theoretic Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 1(3-4), pp. 45-54, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Polymorphic virus, Companion virus, Computability, Detection, Computer virus, Self-reference, Recursion theorem |
63 | Chien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou |
Web service description for mobile phone virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 951-956, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phone virus, ontology, web service, smartphone |
63 | Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda |
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 128-141, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secret leakage, secure OS, virtual machine, information flow, virus |
57 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Characterization of virus replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(3), pp. 221-234, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Li-Ching Wu, Jorng-Tzong Horng, Hsien-Da Huang, Wei-Long Chen |
Identifying Discriminative Amino Acids Within the Hemagglutinin of Human Influenza A H5N1 Virus Using a Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 12(6), pp. 689-695, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Fang Gao, Hongwei Liu 0002, Qiang Zhao 0003, Gang Cui |
Virus-Evolutionary Particle Swarm Optimization Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 156-165, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Biologically Inspired Computer Virus Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioADIT ![In: Biologically Inspired Approaches to Advanced Information Technology, First International Workshop, BioADIT 2004, Lausanne, Switzerland, January 29-30, 2004. Revised Selected Papers, pp. 153-165, 2004, Springer, 3-540-23339-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Gustaf Kylberg, Ida-Maria Sintorn, Gunilla Borgefors |
Towards Automated TEM for Virus Diagnostics: Segmentation of Grid Squares and Detection of Regions of Interest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCIA ![In: Image Analysis, 16th Scandinavian Conference, SCIA 2009, Oslo, Norway, June 15-18, 2009. Proceedings, pp. 169-178, 2009, Springer, 978-3-642-02229-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TEM, virus diagnostics, automatic image acquisition |
54 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001 |
Characterizing and Detecting Virus Replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONS ![In: The Third International Conference on Systems, ICONS 2008, April 13-18, 2008, Cancun, Mexico, pp. 214-219, 2008, IEEE Computer Society, 978-0-7695-3105-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavior based self reference, replication security, virus detection |
54 | Kenneth S. Edge, Gary B. Lamont, Richard A. Raines |
A retrovirus inspired algorithm for virus detection & optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006, pp. 103-110, 2006, ACM, 1-59593-186-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, genetic algorithms, detection, function optimization, RNA, computer virus, memetic |
54 | Deepak Venugopal, Guoning Hu, Nicoleta Roman |
Intelligent virus detection on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 65, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
common functionality, security, mobile, virus detection, DLL |
54 | Kevin Davis |
Saving users from themselves: creating an effective student-oriented anti-virus intervention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 29th Annual ACM SIGUCCS Conference on User Services 2001, Portland, Oregon, USA, October 17-20, 2001, pp. 27-32, 2001, ACM, 1-58113-382-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
McAfee VirusScan, residential computing support, computer security, intervention, anti-virus, user services |
54 | Yanfang Ye 0001, Tao Li 0001, Qingshan Jiang, Zhixue Han, Li Wan |
Intelligent file scoring system for malware detection from the gray list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1385-1394, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
gray list, ensemble, malware detection |
54 | Derek Uluski, Micha Moffie, David R. Kaeli |
Characterizing antivirus workload execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 90-98, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(2), pp. 823-833, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | InSeon Yoo |
Visualizing windows executable viruses using self-organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 82-89, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
windows executable viruses, visualization, self-organizing maps |
54 | Stefan Burkhardt, Kimmo Fredriksson, Tuomas Ojamies, Janne Ravantti, Esko Ukkonen |
Local Approximate 3D Matching of Proteins in Viral Cryo-EM Density Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3DPVT ![In: 2nd International Symposium on 3D Data Processing, Visualization and Transmission (3DPVT 2004), 6-9 September 2004, Thessaloniki, Greece, pp. 979-986, 2004, IEEE Computer Society, 0-7695-2223-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Evolvable malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, pp. 1569-1576, 2009, ACM, 978-1-60558-325-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
genetic algorithm, computer virus, artificial evolution |
51 | Naomi Fujimura, Itsuo Omagari, Masatsugu Ueda, Keiichi Irie |
Experience with software blanket contract in Kyushu University. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 307-310, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-virus software, campus agreement, software license, CSR |
49 | Yibin Zheng, Peter C. Doerschuk |
Reconstruction of viruses from solution X-ray scattering data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings 1995 International Conference on Image Processing, Washington, DC, USA, October 23-26, 1995, pp. 434-437, 1995, IEEE Computer Society, 0-8186-7310-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
X-ray scattering, biological techniques, viruses reconstruction, solution X-ray scattering data, 3-dimensional structure, icosahedrally-symmetric viruses, Gerchberg-Saxton algorithm generalization, unknown n-vector, norm squared, virus particles dynamics, cowpea mosaic virus, iterative methods, iterative algorithm, molecular configurations, molecular biophysics, model-based method |
48 | William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr |
Evaluation of Approaches for Tracking Virus Particles in Fluorescence Microscopy Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bildverarbeitung für die Medizin ![In: Bildverarbeitung für die Medizin 2009: Algorithmen - Systeme - Anwendungen, Proceedings des Workshops vom 22. bis 25. März 2009 in Heidelberg, pp. 207-211, 2009, Springer, 978-3-540-93859-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Hua Zhong, Shuji Gong, Wei Zhao, Lidan Chen, Hao Zhou, Liang Peng, Hong Cao |
Bioinformatics Analysis of the Envelope Glycoprotein and Construction of Infectious RNA Transcripts of Dengue Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FBIT ![In: Frontiers in the Convergence of Bioscience and Information Technologies 2007, FBIT 2007, Jeju Island, Korea, October 11-13, 2007, pp. 256-260, 2007, IEEE Computer Society, 978-0-7695-2999-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Tsern-Huei Lee |
Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 792-797, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Baojun Zhang, Jiebing Wang, Xuezeng Pan |
Virus Scan System Based on Hardware-Acceleration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 344-351, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
YUQUAN, HPM, Frox, Hpmd, Concurrency |
48 | Sébastien Josse |
How to Assess the Effectiveness of your Anti-virus? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(1), pp. 51-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Donghyun Lim, Jin-Wook Chung, Seong-Jin Ahn 0001 |
Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2006, 7th International Conference, Burgos, Spain, September 20-23, 2006, Proceedings, pp. 444-453, 2006, Springer, 3-540-45485-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Lansheng Han, Varney Washington, Yuanbo Wang, Shuxia Han |
Tracing the Source of Net-Virus within a Subnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 952-956, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004, pp. 11-22, 2004, ACM Press, 1-58113-970-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
48 | Si Choon Noh, Dong Chun Lee, Kuinam J. Kim |
Multi-level Protection Building for Virus Protection Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp. 631-634, 2004, Springer, 3-540-22114-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Takeshi Okamoto, Yoshiteru Ishida |
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: The Fourth International Symposium on Autonomous Decentralized Systems, ISADS 1999, Tokyo, Japan, March 20-23, 1999, pp. 328-331, 1999, IEEE Computer Society, 0-7695-0137-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Juan G. Díaz Ochoa, Andreas Voigt, Heiko Briesen, Kai Sundmacher |
Time Dependent Virus Replication in Cell Cultures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 651-656, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Virus Replication, Influenza A, Cellular viral Resistance |
45 | Tao Gong, Zixing Cai |
Tri-tier Immune System in Anti-virus and Software Fault Diagnosis of Mobile Immune Robot Based on Normal Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 51(2), pp. 187-201, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Normal model, Immune robot, Fault diagnosis, Artificial immune system, Anti-virus |
45 | Tao Li |
Dynamic detection for computer virus based on immune system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(10), pp. 1475-1486, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
artificial immune system, negative selection, clonal selection, computer virus, immune memory |
45 | Yu Zhang 0003, Tao Li, Renchao Qin |
A Dynamic Immunity-Based Model for Computer Virus Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 515-519, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
vaccine gene library, computer immune system, artificial immune system, computer virus |
45 | Yu Zhang 0003, Tao Li, Renchao Qin |
Computer Virus Evolution Model Inspired by Biological DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 943-950, 2008, Springer, 978-3-540-85983-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer virus evolution, biological DNA, artificial life |
45 | Renchao Qin, Tao Li, Yu Zhang 0003 |
A Novel Biology-Inspired Virus Detection Model with RVNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Third International Symposium, ISICA 2008, Wuhan, China, December 19-21, 2008 Proceedings, pp. 446-453, 2008, Springer, 978-3-540-92136-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Artificial immune principles, variable-seized detectors, RVNS, Antigen presentation, Virus detection |
45 | Jerry Cheng, Starsky H. Y. Wong, Hao Yang 0004, Songwu Lu |
SmartSiren: virus detection and alert for smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 258-271, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, smartphone, alert, virus detection |
45 | Thomas Moscibroda, Stefan Schmid 0001, Roger Wattenhofer |
When selfish meets evil: byzantine players in a virus inoculation game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, July 23-26, 2006, pp. 35-44, 2006, ACM, 1-59593-384-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
byzantine nash equilibria, price of malice, virus propagation, game theory, price of anarchy, selfishness |
45 | Assane Gueye, Jean C. Walrand |
Security in networks: A game-theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: Proceedings of the 47th IEEE Conference on Decision and Control, CDC 2008, December 9-11, 2008, Cancún, Mexico, pp. 829-834, 2008, IEEE, 978-1-4244-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 60-71, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Kevin Deeb, Steven Lewis |
A Biological Approach to the Development of Computer Autoimmune Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 13th International Symposium, ISMIS 2002, Lyon, France, June 27-29, 2002, Proceedings, pp. 514-525, 2002, Springer, 3-540-43785-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Yang Wang 0008, Chenxi Wang |
Modeling the effects of timing parameters on virus propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 61-66, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, epidemiology, computer virus, anti-virus |
42 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 |
Behavior-based modeling and its application to Email analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 6(2), pp. 187-221, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Email virus propagations, anomaly detection, behavior profiling |
42 | Jan A. Bergstra, Alban Ponse |
A Bypass of Cohen's Impossibility Result. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 1097-1106, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Malcode, Program algebra, Worm, Virus, Thread algebra |
39 | Julie Bernal, Trevor I. Dix, Lloyd Allison, Angeline Bartholomeusz, Lilly Yuen |
Modelling Hepatitis B Virus Antiviral Therapy and Drug Resistant Mutant Strains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACAL ![In: Artificial Life: Borrowing from Biology, 4th Australian Conference, ACAL 2009, Melbourne, Australia, December 1-4, 2009. Proceedings, pp. 159-168, 2009, Springer, 978-3-642-10426-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Isaac Barjis, Ajmal Zemmar, Faisal Mohammad, Fakhreldin A. Sabel, Walied Samarrai |
Modeling and simulation of IRES - engagement during the process of mRNA translation in cells infected with hepatitis C virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSC ![In: Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, California, USA, July 16-19, 2007, pp. 852-857, 2007, Simulation Councils, Inc., 1-56555-316-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
simulation, modeling, Petri net, transcription, IRES |
39 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Testing and evaluating virus detectors for handheld devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(2), pp. 135-147, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Seung-Jae Yoo |
Core Technology Analysis and Development for the Virus and Hacking Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 870-879, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Piet Van Mieghem, Jasmina Omic, Robert E. Kooij |
Virus spread in networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 1-14, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Markov theory, mean field theory, virus spread, spectral radius, epidemic threshold |
36 | Robert E. Kooij, Phillip Schumm, Caterina M. Scoglio, Mina Youssef |
A New Metric for Robustness with Respect to Virus Spread. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 562-572, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virus spread, viral conductance, Robustness, epidemic threshold |
36 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 724-728, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
36 | Bo Ning 0003, Xianbin Cao 0001, Yanwu Xu 0001, Jun Zhang 0007 |
Virus-evolutionary genetic algorithm based selective ensemble classifier for pedestrian detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEC Summit ![In: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC Summit 2009, Shanghai, China, June 12-14, 2009, pp. 437-442, 2009, ACM, 978-1-60558-326-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virus-evolutionary genetic algorithm, classifier, pedestrian detection, selective ensemble |
36 | Hitoshi Kanoh, Souichi Tsukahara |
Virus Evolution Strategy for Vehicle Routing Problems with Time Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings, pp. 1041-1050, 2008, Springer, 978-3-540-87699-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NP-hard class, evolution strategy, schema, Vehicle routing problem, virus, infection |
36 | Mondher Bouden, Bernard Moulin, Pierre Gosselin |
Epidemic propagation of west nile virus using a multi-agent geo-simulation under various short-term climate scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 98-105, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
West Nile virus, epidemic propagation, multi-agent geo-simulation, vector control, climate change |
36 | Guang-Zheng Zhang, Chirag Nepal, Kyungsook Han |
Predicting Binding Sites of Hepatitis C Virus Complexes Using Residue Binding Propensity and Sequence Entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 78-85, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hepatitis C virus, binding site prediction, binding propensity, sequence entropy, radial basis function neural networks |
36 | Sam Rash, Dan Gusfield |
String barcoding: uncovering optimal virus signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RECOMB ![In: Proceedings of the Sixth Annual International Conference on Computational Biology, RECOMB 2002, Washington, DC, USA, April 18-21, 2002, pp. 254-261, 2002, ACM, 1-58113-498-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
string barcoding, virus signatures, suffix trees, barcoding, testing set |
36 | Urs E. Gattiker, Helen Kelley |
Morality and technology, or is it wrong to create and let loose a computer virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 563-573, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
computer related actions, women end users, context specific situation, policy makers, moral conduct, electronic highway, moral judgment, cyberspace domain, privacy, human factors, researchers, social aspects of automation, computer crime, social norms, computer virus, computer viruses, morality, theoretical models, professional aspects, civil liberties |
36 | Devavrat Shah, Tauhid Zaman |
Detecting sources of computer viruses in networks: theory and experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: SIGMETRICS 2010, Proceedings of the 2010 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, New York, New York, USA, 14-18 June 2010, pp. 203-214, 2010, ACM, 978-1-4503-0038-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
estimation, epidemics |
36 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(4), pp. 283-293, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 323-334, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | David M. Chess |
Security in autonomic computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 2-5, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Erol Gelenbe |
Keeping Viruses Under Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 1, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Erol Gelenbe |
Keeping Viruses Under Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 304-311, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Conflicts between Agents, Network Security, Computer Viruses |
36 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Artificial Immune System against Viral Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part II, pp. 499-506, 2004, Springer, 3-540-22115-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Darrell M. Kienzle, Matthew C. Elder |
Recent worms: a survey and trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 1-10, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
survey, malicious code |
36 | Shigeyuki Uno, Takenori Shimizu, Torahiko Tanaka, Hiroki Ashiba, Makoto Fujimaki, Mutsuo Tanaka, Koichi Awazu, Makoto Makishima |
Application of a Waveguide-Mode Sensor to Blood Testing for Hepatitis B Virus, Hepatitis C Virus, Human Immunodeficiency Virus and Treponema pallidum Infection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 19(7), pp. 1729, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Hannah E. Clapham, Than Ha Quyen, Duong Thi Hue Kien, Ilaria Dorigatti, Cameron P. Simmons, Neil M. Ferguson |
Modelling Virus and Antibody Dynamics during Dengue Virus Infection Suggests a Role for Antibody in Virus Clearance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLoS Comput. Biol. ![In: PLoS Comput. Biol. 12(5), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida |
Malware phylogeny generation using permutations of code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 1(1-2), pp. 13-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
n-perms, evolution, permutation, Malware, worm, n-grams, virus, phylogeny, naming |
33 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 411-414, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
33 | Richard Ford |
The Wrong Stuff? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 86-89, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
detection, scaling, virus, macro, proactive, antivirus |
33 | Ruiqi Hu, Aloysius K. Mok |
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 82-101, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
malicious executable detection, intrusion detection, virus detection |
33 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2004, Boston, Massachusetts, USA, July 11-14, 2004, pp. 34-44, 2004, ACM, 1-58113-820-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
31 | Yuji Sato, Yuta Yasuda, Ryuji Goto |
Analysis of noisy time-series signals with GA involving viral infection with tropism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 1396-1403, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
time-series problem, tropism, virus evolution, virus infection, genetic algorithms, inverse problem, noisy optimization |
31 | Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |
Visualizing Cyber Attacks using IP Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 11, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus |
30 | Mark Menor, Kyungim Baek, Mahdi Belcaid, Yannick Gingras, Guylaine Poisson |
Virus DNA-fragment classification using taxonomic hidden Markov model profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1567-1571, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
machine learning, annotation, viruses, metagenomics |
30 | Jiming Liu 0001, Chao Gao, Ning Zhong 0001 |
Virus Propagation and Immunization Strategies in Email Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 222-233, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Petr Matula, Anil Kumar 0006, Ilka Wörz, Nathalie Harder, Holger Erfle, Ralf Bartenschlager, Roland Eils, Karl Rohr |
Automated Analysis of siRNA Screens of Virus Infected Cells Based on Immunofluorescence Microscopy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bildverarbeitung für die Medizin ![In: Bildverarbeitung für die Medizin 2008, Algorithmen, Systeme, Anwendungen, Proceedings des Workshops vom 6. bis 8. April 2008 in Berlin, pp. 453-457, 2008, Springer, 978-3-540-78639-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Guoqing Lu, Kashi Buyyani, Naresh Goty, Ruben O. Donis, Zhengxin Chen |
Influenza A Virus Informatics: Genotype-Centered Database and Genotype Annotation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 76-83, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | K. Najeeb, Karthik Gururaj, V. Kamakoti 0001, Vivekananda M. Vedula |
Controllability-driven Power Virus Generation for Digital Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 20th International Conference on VLSI Design (VLSI Design 2007), Sixth International Conference on Embedded Systems (ICES 2007), 6-10 January 2007, Bangalore, India, pp. 407-412, 2007, IEEE Computer Society, 0-7695-2762-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2777 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|