The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "MALWARE"( http://dblp.L3S.de/Venues/MALWARE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/malware

Publication years (Num. hits)
2008 (15) 2009-2010 (30) 2011 (17) 2012 (18) 2013 (18) 2014 (18) 2015 (19) 2016 (21) 2017 (17) 2018 (19)
Publication types (Num. hits)
inproceedings(181) proceedings(11)
Venues (Conferences, Journals, ...)
MALWARE(192)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 192 publication records. Showing 192 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Julien Piet, Blake Anderson, David A. McGrew An In-Depth Study of Open-Source Command and Control Frameworks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian Binary Obfuscation Based Reassemble. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001 SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asaf Hecht, Adi Sagi, Yuval Elovici PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi Model-driven Timing Consistency for Active Malware Redirection. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antoine Lemay, Sylvain P. Leblanc Is eval () Evil : A study of JavaScript in PDF malware. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018 Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  BibTeX  RDF
1George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber 0001, Spiros Mancoridis Malware Anomaly Detection on Virtual Assistants. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shahrear Iqbal, Mohammad Zulkernine SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bander Alsulami, Spiros Mancoridis Behavioral Malware Classification using Convolutional Recurrent Neural Networks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bingyin Zhao, Yingjie Lao Resilience of Pruned Neural Network Against Poisoning Attack. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis Lightweight behavioral malware detection for windows platforms. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber 0001, Spiros Mancoridis Behavioral anomaly detection of malware on home routers. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet GPFinder: Tracking the invisible in Android malware. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arun Lakhotia, Paul Black Mining malware secrets. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lu Yu 0001, Qing Wang 0047, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang TARN: A SDN-based traffic analysis resistant network architecture. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa Predicting signatures of future malware variants. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni Android malware family classification based on resource consumption over time. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017 Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  BibTeX  RDF
1Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively Rootkit detection through phase-space analysis of power voltage measurements. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kurt Baumgartner "Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Julian L. Rrushi Phantom I/O projector: Entrapping malware on machines in production. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha Kali: Scalable encryption fingerprinting in dynamic malware traces. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon A virtual testbed for security management of industrial control systems. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion A construction of a self-modifiying language with a formal correction proof. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuejiang Wen, Yingjie Lao Efficient fuzzy extractor implementations for PUF based authentication. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard Zak, Edward Raff, Charles Nicholas What can N-grams learn for malware detection? Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Angel M. Villegas Function identification and recovery signature tool. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fernando C. Colón Osorio Message from the general program chair. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do On periodic behavior of malware: experiments, opportunities and challenges. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb DySign: dynamic fingerprinting for the automatic detection of android malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dimitri Vitaliev Keynote speaker. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lichao Sun 0001, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan SigPID: significant permission identification for android malware detection. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine Zonedroid: control your droid through application zoning. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luke Jones, Andrew J. Sellers, Martin C. Carlisle CARDINAL: similarity analysis to defeat malware compiler variations. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 Advanced transcriptase for JavaScript malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew Ping, Bander Alsulami, Spiros Mancoridis On the effectiveness of application characteristics in the automatic classification of malware on smartphones. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Korczynski RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio Reverse engineering with bioinformatics algorithms over a sound android covert channel. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jason Upchurch, Xiaobo Zhou 0002 Malware provenance: code reuse detection in malicious software at scale. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao Dissecting developer policy violating apps: characterization and detection. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1William Casey, Aaron Shelmire Signature limits: an entire map of clone features and their discovery in nearly linear time. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yu Fu 0005, Zhe Jia, Lu Yu 0001, Xingsi Zhong, Richard R. Brooks A covert data transport protocol. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asem Kitana, Issa Traoré, Isaac Woungang Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul Black, Joseph Opacki Anti-analysis trends in banking malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khanh-Huu-The Dam, Tayssir Touili Automatic extraction of malicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016 Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  BibTeX  RDF
1Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson Using inherent command and control vulnerabilities to halt DDoS attacks. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner A framework for empirical evaluation of malware detection resilience against behavior obfuscation. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott Segmented sandboxing - A novel approach to Malware polymorphism detection. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 Measuring the health of antivirus ecosystems. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raymond Canzanese, Spiros Mancoridis, Moshe Kam Run-time classification of malicious processes using system call analysis. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto Clustering android malware families by http traffic. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vern Paxson Keynote Speaker. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong GroddDroid: a gorilla for triggering malicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David De Lille, Bart Coppens 0001, Daan Raman, Bjorn De Sutter Automatically combining static malware detection techniques. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1John O'Brien, Kimmo Lehtonen Counterfeit mobile devices - the duck test. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra Sandboxing and reasoning on malware infection trees. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Kerber, Dominik Teubert, Ulrike Meyer Covert remote syscall communication at kernel level: A SPOOKY backdoor. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy Measuring the information security risk in an infrastructure. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015 Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  BibTeX  RDF
1Xingsi Zhong, Yu Fu 0005, Lu Yu 0001, Richard R. Brooks, Ganesh Kumar Venayagamoorthy Stealthy malware traffic - Not as innocent as it looks. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua Saxe, Konstantin Berlin Deep neural network based malware detection using two dimensional binary program features. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan Targeted DoS on android: how to disable android in 10 seconds or less. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Upchurch, Xiaobo Zhou 0002 Variant: a malware similarity testing framework. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier Gorille sniffs code similarities, the case study of qwerty versus regin. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Barabosch, Elmar Gerhards-Padilla Host-based code injection attacks: A popular technique used by malware. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig PsyBoG: Power spectral density analysis for detecting botnet groups. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra Agent-based trace learning in a recommendation-verification system for cybersecurity. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mark E. Fioravanti II, Richard Ford Bacterial quorum sensing for coordination of targeted malware. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier 0001 Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio Protection against remote code execution exploits of popular applications in Windows. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan BoTGen: A new approach for in-lab generation of botnet datasets. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fanny Lalonde Lévesque, José M. Fernandez 0001, Anil Somayaji Risk prediction of malware victimization based on user behavior. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joshua Saxe, Rafael Turner, Kristina Blokhin CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014 Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  BibTeX  RDF
1Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson Fighting banking botnets by exploiting inherent command and control vulnerabilities. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao Automatic construction of printable return-oriented programming payload. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas Identifying malware genera using the Jensen-Shannon distance between system call traces. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jan Gassen, Jonathan P. Chapman HoneyAgent: Detecting malicious Java applets by using dynamic analysis. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch Heuristic malware detection via basic block comparison. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry Analysis and diversion of Duqu's driver. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan Synthesizing near-optimal malware specifications from suspicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongyuan Qiu, Fernando C. Colón Osorio Static malware detection with Segmented Sandboxing. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gen Lu, Karan Chadha, Saumya K. Debray A simple client-side defense against environment-dependent web-based malware. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 192 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license