Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Julien Piet, Blake Anderson, David A. McGrew |
An In-Depth Study of Open-Source Command and Control Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 23-30, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 3-12, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney |
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 95-102, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc |
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 68-77, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua |
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 115-123, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum |
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 161-166, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian |
Binary Obfuscation Based Reassemble. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 153-160, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001 |
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 145-152, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Asaf Hecht, Adi Sagi, Yuval Elovici |
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 87-94, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi |
Model-driven Timing Consistency for Active Malware Redirection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 132-141, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Lemay, Sylvain P. Leblanc |
Is eval () Evil : A study of JavaScript in PDF malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 13-22, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE, 978-1-7281-0155-2 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
1 | George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos |
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 61-67, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber 0001, Spiros Mancoridis |
Malware Anomaly Detection on Virtual Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 124-131, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shahrear Iqbal, Mohammad Zulkernine |
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 33-40, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bander Alsulami, Spiros Mancoridis |
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 103-111, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton |
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 49-58, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bingyin Zhao, Yingjie Lao |
Resilience of Pruned Neural Network Against Poisoning Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 78-83, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez |
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 41-48, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis |
Lightweight behavioral malware detection for windows platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 75-81, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber 0001, Spiros Mancoridis |
Behavioral anomaly detection of malware on home routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 47-54, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet |
GPFinder: Tracking the invisible in Android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 39-46, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arun Lakhotia, Paul Black |
Mining malware secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 11-18, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou |
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 67-74, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Qing Wang 0047, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang |
TARN: A SDN-based traffic analysis resistant network architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 91-98, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa |
Predicting signatures of future malware variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 126-132, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni |
Android malware family classification based on resource consumption over time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 31-38, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-5386-1436-5 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively |
Rootkit detection through phase-space analysis of power voltage measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 19-27, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kurt Baumgartner |
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 1, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Julian L. Rrushi |
Phantom I/O projector: Entrapping malware on machines in production. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 57-66, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha |
Kali: Scalable encryption fingerprinting in dynamic malware traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 3-10, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon |
A virtual testbed for security management of industrial control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 85-90, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion |
A construction of a self-modifiying language with a formal correction proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 99-106, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuejiang Wen, Yingjie Lao |
Efficient fuzzy extractor implementations for PUF based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 119-125, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard Zak, Edward Raff, Charles Nicholas |
What can N-grams learn for malware detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 109-118, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Angel M. Villegas |
Function identification and recovery signature tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 157-164, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fernando C. Colón Osorio |
Message from the general program chair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do |
On periodic behavior of malware: experiments, opportunities and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 85-92, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb |
DySign: dynamic fingerprinting for the automatic detection of android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 139-146, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dimitri Vitaliev |
Keynote speaker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lichao Sun 0001, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan |
SigPID: significant permission identification for android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 59-66, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Md. Shahrear Iqbal, Mohammad Zulkernine |
Zonedroid: control your droid through application zoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 113-120, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Luke Jones, Andrew J. Sellers, Martin C. Carlisle |
CARDINAL: similarity analysis to defeat malware compiler variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 39-46, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 |
Advanced transcriptase for JavaScript malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 121-128, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Ping, Bander Alsulami, Spiros Mancoridis |
On the effectiveness of application characteristics in the automatic classification of malware on smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 75-82, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Korczynski |
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 31-38, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio |
Reverse engineering with bioinformatics algorithms over a sound android covert channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 3-9, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jason Upchurch, Xiaobo Zhou 0002 |
Malware provenance: code reuse detection in malicious software at scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 101-109, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao |
Dissecting developer policy violating apps: characterization and detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 10-19, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | William Casey, Aaron Shelmire |
Signature limits: an entire map of clone features and their discovery in nearly linear time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 147-156, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yu Fu 0005, Zhe Jia, Lu Yu 0001, Xingsi Zhong, Richard R. Brooks |
A covert data transport protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 93-100, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Asem Kitana, Issa Traoré, Isaac Woungang |
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 20-30, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paul Black, Joseph Opacki |
Anti-analysis trends in banking malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 129-135, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba |
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 67-74, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khanh-Huu-The Dam, Tayssir Touili |
Automatic extraction of malicious behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 47-56, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-5090-4542-6 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson |
Using inherent command and control vulnerabilities to halt DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 3-10, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner |
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 40-47, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott |
Segmented sandboxing - A novel approach to Malware polymorphism detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 59-68, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 |
Measuring the health of antivirus ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 101-109, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raymond Canzanese, Spiros Mancoridis, Moshe Kam |
Run-time classification of malicious processes using system call analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 21-28, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto |
Clustering android malware families by http traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 128-135, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vern Paxson |
Keynote Speaker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 1, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong |
GroddDroid: a gorilla for triggering malicious behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 119-127, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David De Lille, Bart Coppens 0001, Daan Raman, Bjorn De Sutter |
Automatically combining static malware detection techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 48-55, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | John O'Brien, Kimmo Lehtonen |
Counterfeit mobile devices - the duck test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 144-151, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra |
Sandboxing and reasoning on malware infection trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 69-73, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerber, Dominik Teubert, Ulrike Meyer |
Covert remote syscall communication at kernel level: A SPOOKY backdoor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 74-81, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy |
Measuring the information security risk in an infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 93-100, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-5090-0317-4 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Xingsi Zhong, Yu Fu 0005, Lu Yu 0001, Richard R. Brooks, Ganesh Kumar Venayagamoorthy |
Stealthy malware traffic - Not as innocent as it looks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 110-116, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Saxe, Konstantin Berlin |
Deep neural network based malware detection using two dimensional binary program features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 11-20, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan |
Targeted DoS on android: how to disable android in 10 seconds or less. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 136-143, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jason Upchurch, Xiaobo Zhou 0002 |
Variant: a malware similarity testing framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 31-39, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier |
Gorille sniffs code similarities, the case study of qwerty versus regin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 82-89, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Barabosch, Elmar Gerhards-Padilla |
Host-based code injection attacks: A popular technique used by malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 8-17, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig |
PsyBoG: Power spectral density analysis for detecting botnet groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 85-92, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra |
Agent-based trace learning in a recommendation-verification system for cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 135-143, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mark E. Fioravanti II, Richard Ford |
Bacterial quorum sensing for coordination of targeted malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 101-108, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn |
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 50-57, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier 0001 |
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 118-127, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio |
Protection against remote code execution exploits of popular applications in Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 26-31, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan |
BoTGen: A new approach for in-lab generation of botnet datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 76-84, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fanny Lalonde Lévesque, José M. Fernandez 0001, Anil Somayaji |
Risk prediction of malware victimization based on user behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 128-134, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Saxe, Rafael Turner, Kristina Blokhin |
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 68-75, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4799-7328-6 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson |
Fighting banking botnets by exploiting inherent command and control vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 93-100, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici |
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 58-67, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao |
Automatic construction of printable return-oriented programming payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 18-25, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio |
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 40-49, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio |
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 35-42, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas |
Identifying malware genera using the Jensen-Shannon distance between system call traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 1-7, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jan Gassen, Jonathan P. Chapman |
HoneyAgent: Detecting malicious Java applets by using dynamic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 109-117, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch |
Heuristic malware detection via basic block comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 11-18, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos |
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 116-123, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Analysis and diversion of Duqu's driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 109-115, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan |
Synthesizing near-optimal malware specifications from suspicious behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 41-50, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongyuan Qiu, Fernando C. Colón Osorio |
Static malware detection with Segmented Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 132-141, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gen Lu, Karan Chadha, Saumya K. Debray |
A simple client-side defense against environment-dependent web-based malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 124-131, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|