|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 868 occurrences of 557 keywords
|
|
|
Results
Found 2777 publication records. Showing 2777 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
138 | InSeon Yoo, Ulrich Ultes-Nitsche |
Non-signature based virus detection. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
106 | Xin Zhou, Bo Xu 0018, Yaxuan Qi, Jun Li 0003 |
MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Virus Signatures, Performance, Algorithms, Pattern Matching, Anti-Virus |
106 | Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin |
A Novel Immune Based Approach for Detection of Windows PE Virus. |
ADMA |
2008 |
DBLP DOI BibTeX RDF |
computer immune system, PE virus detection, relocation module, virus gene pool |
106 | Madihah Saudi, Nazean Jomhari |
Knowledge Structure on Virus for User Education. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload |
105 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
99 | John Case, Samuel E. Moelius |
Cautious virus detection in the extreme. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
co-isolated sets, program self-reference, simple sets, virus detection, recursion theorems |
97 | Minh Nhat Quang Truong, Trong Nghia Hoang |
A Multi-agent Mechanism in Machine Learning Approach to Anti-virus System. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
Machine Learning, Multi-agent, Computer virus, Anti-virus |
93 | Ryuiti Koike, Naoshi Nakaya, Yuji Koi |
Development of System for the Automatic Generation of Unknown Virus Extermination Software. |
SAINT |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Lansheng Han, Shuxia Han, Bing Peng, Varney Washington |
Fuzzy Tracing the Source of Net-Virus. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Net-virus, fuzzy trace, network security |
88 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
84 | Ming Liu, Lansheng Han, Mengsong Zou, Qiwen Liu |
An Evaluating Model for Anti-virus Ability Based on AHP. |
CSE (1) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Srilatha Attaluri, Scott McGhee, Mark Stamp 0001 |
Profile hidden Markov models and metamorphic virus detection. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Min Feng 0001, Rajiv Gupta 0001 |
Detecting virus mutations via dynamic matching. |
ICSM |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Aviezri S. Fraenkel |
Virus Versus Mankind. |
Computers and Games |
2000 |
DBLP DOI BibTeX RDF |
two-player cellular automata games, generalized Sprague-Grundy function |
75 | Yuji Watanabe, Hideki Imai |
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
72 | K. Najeeb, Vishnu Vardhan Reddy Konda, Siva Kumar Sastry Hari, V. Kamakoti 0001, Vivekananda M. Vedula |
Power Virus Generation Using Behavioral Models of Circuits. |
VTS |
2007 |
DBLP DOI BibTeX RDF |
Dynamic power dissipation, Power virus, Integer Constraint Solvers, Hardware Description Languages (HDL), Behavioral Models |
67 | Chenxi Wang, John C. Knight, Matthew C. Elder |
On Computer Viral Infection and the Effect of Immunization. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization |
66 | Matt Webster, Grant Malcolm |
Formal affordance-based models of computer virus reproduction. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens |
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Arun Lakhotia, Moinuddin Mohammed |
Imposing Order on Program Statements to Assist Anti-Virus Scanners. |
WCRE |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Matthew M. Williamson |
Design, Implementation and Test of an Email Virus Throttle. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
64 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
On Abstract Computer Virology from a Recursion Theoretic Perspective. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Polymorphic virus, Companion virus, Computability, Detection, Computer virus, Self-reference, Recursion theorem |
63 | Chien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou |
Web service description for mobile phone virus. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
mobile phone virus, ontology, web service, smartphone |
63 | Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda |
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
secret leakage, secure OS, virtual machine, information flow, virus |
57 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Characterization of virus replication. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Li-Ching Wu, Jorng-Tzong Horng, Hsien-Da Huang, Wei-Long Chen |
Identifying Discriminative Amino Acids Within the Hemagglutinin of Human Influenza A H5N1 Virus Using a Decision Tree. |
IEEE Trans. Inf. Technol. Biomed. |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Fang Gao, Hongwei Liu 0002, Qiang Zhao 0003, Gang Cui |
Virus-Evolutionary Particle Swarm Optimization Algorithm. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Biologically Inspired Computer Virus Detection System. |
BioADIT |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Gustaf Kylberg, Ida-Maria Sintorn, Gunilla Borgefors |
Towards Automated TEM for Virus Diagnostics: Segmentation of Grid Squares and Detection of Regions of Interest. |
SCIA |
2009 |
DBLP DOI BibTeX RDF |
TEM, virus diagnostics, automatic image acquisition |
54 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001 |
Characterizing and Detecting Virus Replication. |
ICONS |
2008 |
DBLP DOI BibTeX RDF |
behavior based self reference, replication security, virus detection |
54 | Kenneth S. Edge, Gary B. Lamont, Richard A. Raines |
A retrovirus inspired algorithm for virus detection & optimization. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
security, genetic algorithms, detection, function optimization, RNA, computer virus, memetic |
54 | Deepak Venugopal, Guoning Hu, Nicoleta Roman |
Intelligent virus detection on mobile devices. |
PST |
2006 |
DBLP DOI BibTeX RDF |
common functionality, security, mobile, virus detection, DLL |
54 | Kevin Davis |
Saving users from themselves: creating an effective student-oriented anti-virus intervention. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
McAfee VirusScan, residential computing support, computer security, intervention, anti-virus, user services |
54 | Yanfang Ye 0001, Tao Li 0001, Qingshan Jiang, Zhixue Han, Li Wan |
Intelligent file scoring system for malware detection from the gray list. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
gray list, ensemble, malware detection |
54 | Derek Uluski, Micha Moffie, David R. Kaeli |
Characterizing antivirus workload execution. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. |
IEEE Trans. Syst. Man Cybern. Part B |
2004 |
DBLP DOI BibTeX RDF |
|
54 | InSeon Yoo |
Visualizing windows executable viruses using self-organizing maps. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
windows executable viruses, visualization, self-organizing maps |
54 | Stefan Burkhardt, Kimmo Fredriksson, Tuomas Ojamies, Janne Ravantti, Esko Ukkonen |
Local Approximate 3D Matching of Proteins in Viral Cryo-EM Density Maps. |
3DPVT |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Evolvable malware. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
genetic algorithm, computer virus, artificial evolution |
51 | Naomi Fujimura, Itsuo Omagari, Masatsugu Ueda, Keiichi Irie |
Experience with software blanket contract in Kyushu University. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
anti-virus software, campus agreement, software license, CSR |
49 | Yibin Zheng, Peter C. Doerschuk |
Reconstruction of viruses from solution X-ray scattering data. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
X-ray scattering, biological techniques, viruses reconstruction, solution X-ray scattering data, 3-dimensional structure, icosahedrally-symmetric viruses, Gerchberg-Saxton algorithm generalization, unknown n-vector, norm squared, virus particles dynamics, cowpea mosaic virus, iterative methods, iterative algorithm, molecular configurations, molecular biophysics, model-based method |
48 | William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr |
Evaluation of Approaches for Tracking Virus Particles in Fluorescence Microscopy Images. |
Bildverarbeitung für die Medizin |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Hua Zhong, Shuji Gong, Wei Zhao, Lidan Chen, Hao Zhou, Liang Peng, Hong Cao |
Bioinformatics Analysis of the Envelope Glycoprotein and Construction of Infectious RNA Transcripts of Dengue Virus. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Tsern-Huei Lee |
Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Baojun Zhang, Jiebing Wang, Xuezeng Pan |
Virus Scan System Based on Hardware-Acceleration. |
IMSCCS |
2007 |
DBLP DOI BibTeX RDF |
YUQUAN, HPM, Frox, Hpmd, Concurrency |
48 | Sébastien Josse |
How to Assess the Effectiveness of your Anti-virus? |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Donghyun Lim, Jin-Wook Chung, Seong-Jin Ahn 0001 |
Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme. |
IDEAL |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Lansheng Han, Varney Washington, Yuanbo Wang, Shuxia Han |
Tracing the Source of Net-Virus within a Subnet. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
48 | Si Choon Noh, Dong Chun Lee, Kuinam J. Kim |
Multi-level Protection Building for Virus Protection Infrastructure. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Takeshi Okamoto, Yoshiteru Ishida |
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. |
ISADS |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Juan G. Díaz Ochoa, Andreas Voigt, Heiko Briesen, Kai Sundmacher |
Time Dependent Virus Replication in Cell Cultures. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
Virus Replication, Influenza A, Cellular viral Resistance |
45 | Tao Gong, Zixing Cai |
Tri-tier Immune System in Anti-virus and Software Fault Diagnosis of Mobile Immune Robot Based on Normal Model. |
J. Intell. Robotic Syst. |
2008 |
DBLP DOI BibTeX RDF |
Normal model, Immune robot, Fault diagnosis, Artificial immune system, Anti-virus |
45 | Tao Li |
Dynamic detection for computer virus based on immune system. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
artificial immune system, negative selection, clonal selection, computer virus, immune memory |
45 | Yu Zhang 0003, Tao Li, Renchao Qin |
A Dynamic Immunity-Based Model for Computer Virus Detection. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
vaccine gene library, computer immune system, artificial immune system, computer virus |
45 | Yu Zhang 0003, Tao Li, Renchao Qin |
Computer Virus Evolution Model Inspired by Biological DNA. |
ICIC (2) |
2008 |
DBLP DOI BibTeX RDF |
computer virus evolution, biological DNA, artificial life |
45 | Renchao Qin, Tao Li, Yu Zhang 0003 |
A Novel Biology-Inspired Virus Detection Model with RVNS. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
Artificial immune principles, variable-seized detectors, RVNS, Antigen presentation, Virus detection |
45 | Jerry Cheng, Starsky H. Y. Wong, Hao Yang 0004, Songwu Lu |
SmartSiren: virus detection and alert for smartphones. |
MobiSys |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, smartphone, alert, virus detection |
45 | Thomas Moscibroda, Stefan Schmid 0001, Roger Wattenhofer |
When selfish meets evil: byzantine players in a virus inoculation game. |
PODC |
2006 |
DBLP DOI BibTeX RDF |
byzantine nash equilibria, price of malice, virus propagation, game theory, price of anarchy, selfishness |
45 | Assane Gueye, Jean C. Walrand |
Security in networks: A game-theoretic approach. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Kevin Deeb, Steven Lewis |
A Biological Approach to the Development of Computer Autoimmune Systems. |
ISMIS |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Yang Wang 0008, Chenxi Wang |
Modeling the effects of timing parameters on virus propagation. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, epidemiology, computer virus, anti-virus |
42 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 |
Behavior-based modeling and its application to Email analysis. |
ACM Trans. Internet Techn. |
2006 |
DBLP DOI BibTeX RDF |
Email virus propagations, anomaly detection, behavior profiling |
42 | Jan A. Bergstra, Alban Ponse |
A Bypass of Cohen's Impossibility Result. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
Malcode, Program algebra, Worm, Virus, Thread algebra |
39 | Julie Bernal, Trevor I. Dix, Lloyd Allison, Angeline Bartholomeusz, Lilly Yuen |
Modelling Hepatitis B Virus Antiviral Therapy and Drug Resistant Mutant Strains. |
ACAL |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Isaac Barjis, Ajmal Zemmar, Faisal Mohammad, Fakhreldin A. Sabel, Walied Samarrai |
Modeling and simulation of IRES - engagement during the process of mRNA translation in cells infected with hepatitis C virus. |
SCSC |
2007 |
DBLP BibTeX RDF |
simulation, modeling, Petri net, transcription, IRES |
39 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Testing and evaluating virus detectors for handheld devices. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Seung-Jae Yoo |
Core Technology Analysis and Development for the Virus and Hacking Prevention. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Piet Van Mieghem, Jasmina Omic, Robert E. Kooij |
Virus spread in networks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
Markov theory, mean field theory, virus spread, spectral radius, epidemic threshold |
36 | Robert E. Kooij, Phillip Schumm, Caterina M. Scoglio, Mina Youssef |
A New Metric for Robustness with Respect to Virus Spread. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
virus spread, viral conductance, Robustness, epidemic threshold |
36 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
36 | Bo Ning 0003, Xianbin Cao 0001, Yanwu Xu 0001, Jun Zhang 0007 |
Virus-evolutionary genetic algorithm based selective ensemble classifier for pedestrian detection. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
virus-evolutionary genetic algorithm, classifier, pedestrian detection, selective ensemble |
36 | Hitoshi Kanoh, Souichi Tsukahara |
Virus Evolution Strategy for Vehicle Routing Problems with Time Windows. |
PPSN |
2008 |
DBLP DOI BibTeX RDF |
NP-hard class, evolution strategy, schema, Vehicle routing problem, virus, infection |
36 | Mondher Bouden, Bernard Moulin, Pierre Gosselin |
Epidemic propagation of west nile virus using a multi-agent geo-simulation under various short-term climate scenarios. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
West Nile virus, epidemic propagation, multi-agent geo-simulation, vector control, climate change |
36 | Guang-Zheng Zhang, Chirag Nepal, Kyungsook Han |
Predicting Binding Sites of Hepatitis C Virus Complexes Using Residue Binding Propensity and Sequence Entropy. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
hepatitis C virus, binding site prediction, binding propensity, sequence entropy, radial basis function neural networks |
36 | Sam Rash, Dan Gusfield |
String barcoding: uncovering optimal virus signatures. |
RECOMB |
2002 |
DBLP DOI BibTeX RDF |
string barcoding, virus signatures, suffix trees, barcoding, testing set |
36 | Urs E. Gattiker, Helen Kelley |
Morality and technology, or is it wrong to create and let loose a computer virus. |
HICSS (3) |
1995 |
DBLP DOI BibTeX RDF |
computer related actions, women end users, context specific situation, policy makers, moral conduct, electronic highway, moral judgment, cyberspace domain, privacy, human factors, researchers, social aspects of automation, computer crime, social norms, computer virus, computer viruses, morality, theoretical models, professional aspects, civil liberties |
36 | Devavrat Shah, Tauhid Zaman |
Detecting sources of computer viruses in networks: theory and experiment. |
SIGMETRICS |
2010 |
DBLP DOI BibTeX RDF |
estimation, epidemics |
36 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
36 | David M. Chess |
Security in autonomic computing. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
Conflicts between Agents, Network Security, Computer Viruses |
36 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Artificial Immune System against Viral Attack. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Darrell M. Kienzle, Matthew C. Elder |
Recent worms: a survey and trends. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
survey, malicious code |
36 | Shigeyuki Uno, Takenori Shimizu, Torahiko Tanaka, Hiroki Ashiba, Makoto Fujimaki, Mutsuo Tanaka, Koichi Awazu, Makoto Makishima |
Application of a Waveguide-Mode Sensor to Blood Testing for Hepatitis B Virus, Hepatitis C Virus, Human Immunodeficiency Virus and Treponema pallidum Infection. |
Sensors |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Hannah E. Clapham, Than Ha Quyen, Duong Thi Hue Kien, Ilaria Dorigatti, Cameron P. Simmons, Neil M. Ferguson |
Modelling Virus and Antibody Dynamics during Dengue Virus Infection Suggests a Role for Antibody in Virus Clearance. |
PLoS Comput. Biol. |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida |
Malware phylogeny generation using permutations of code. |
J. Comput. Virol. |
2005 |
DBLP DOI BibTeX RDF |
n-perms, evolution, permutation, Malware, worm, n-grams, virus, phylogeny, naming |
33 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
33 | Richard Ford |
The Wrong Stuff? |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
detection, scaling, virus, macro, proactive, antivirus |
33 | Ruiqi Hu, Aloysius K. Mok |
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
malicious executable detection, intrusion detection, virus detection |
33 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
31 | Yuji Sato, Yuta Yasuda, Ryuji Goto |
Analysis of noisy time-series signals with GA involving viral infection with tropism. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
time-series problem, tropism, virus evolution, virus infection, genetic algorithms, inverse problem, noisy optimization |
31 | Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |
Visualizing Cyber Attacks using IP Matrix. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus |
30 | Mark Menor, Kyungim Baek, Mahdi Belcaid, Yannick Gingras, Guylaine Poisson |
Virus DNA-fragment classification using taxonomic hidden Markov model profiles. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
machine learning, annotation, viruses, metagenomics |
30 | Jiming Liu 0001, Chao Gao, Ning Zhong 0001 |
Virus Propagation and Immunization Strategies in Email Networks. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Petr Matula, Anil Kumar 0006, Ilka Wörz, Nathalie Harder, Holger Erfle, Ralf Bartenschlager, Roland Eils, Karl Rohr |
Automated Analysis of siRNA Screens of Virus Infected Cells Based on Immunofluorescence Microscopy. |
Bildverarbeitung für die Medizin |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Guoqing Lu, Kashi Buyyani, Naresh Goty, Ruben O. Donis, Zhengxin Chen |
Influenza A Virus Informatics: Genotype-Centered Database and Genotype Annotation. |
IMSCCS |
2007 |
DBLP DOI BibTeX RDF |
|
30 | K. Najeeb, Karthik Gururaj, V. Kamakoti 0001, Vivekananda M. Vedula |
Controllability-driven Power Virus Generation for Digital Circuits. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2777 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|