The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Anti-virus (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2001 (16) 2002-2004 (18) 2005-2006 (28) 2007 (16) 2008 (21) 2009 (18) 2010-2012 (15) 2013-2016 (16) 2017-2020 (18) 2021-2023 (11)
Publication types (Num. hits)
article(43) inproceedings(133) phdthesis(1)
Venues (Conferences, Journals, ...)
J. Comput. Virol.(12) SIGUCCS(12) CoRR(8) Comput. Secur.(4) ACSAC(3) DIMVA(3) HICSS(3) IEEE Access(3) Inf. Secur. J. A Glob. Perspec...(3) KDD(3) RAID(3) GLOBECOM(2) IAS(2) ICCCN(2) ISI(2) SAC(2) More (+10 of total 123)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 174 occurrences of 133 keywords

Results
Found 177 publication records. Showing 177 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Byungho Min, Vijay Varadharajan Design, implementation and evaluation of a novel anti-virus parasitic malware. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Nguyen Hoang Thuan, Pedro Antunes 0001, David Johnstone 0001, Minh Nhat Quang Truong An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base. Search on Bibsonomy FDSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Umakant Mishra How do Viruses Attack Anti-Virus Programs. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Umakant Mishra Protecting Anti-virus Programs From Viral Attacks. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. Search on Bibsonomy NBiS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Yan Ma, Mehrdad Sepehri Sharbaf Investigation of Static and Dynamic Android Anti-virus Strategies. Search on Bibsonomy ITNG The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Wei Yan, Nirwan Ansari Anti-virus in-the-cloud service: are we ready for the security evolution? Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Min Zheng, Patrick P. C. Lee, John C. S. Lui ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Orestis Tsigkas, Dimitrios Tzovaras Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Lihua Wu, Yu Zhang 0003 Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Nen-Fu Huang, Chia-Nan Kao, Rong-Tai Liu A novel software-based MD5 checksum lookup scheme for anti-virus systems. Search on Bibsonomy IWCMC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Ding-Long Huang, Pei-Luen Patrick Rau, Hui Su, Nan Tu, Chen Zhao Effects of communication style and time orientation on notification systems and anti-virus software. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. Search on Bibsonomy login Usenix Mag. The full citation details ... 2010 DBLP  BibTeX  RDF
20Nen-Fu Huang, Wen-Yen Tsai SHOCK: A Worst-Case Ensured Sub-Linear Time Pattern Matching Algorithm for Inline Anti-Virus Scanning. Search on Bibsonomy ICC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
20Wyman Stocks When Anti-virus Doesn't Cut It: Catching Malware with SIEM. Search on Bibsonomy LISA The full citation details ... 2010 DBLP  BibTeX  RDF
20Wei Yan, Nirwan Ansari Why Anti-Virus Products Slow Down Your Machine? Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Tao Gong Anti-virus security and robustness of heterogeneous immune static network. Search on Bibsonomy QSHINE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Attila Ondi A drawback of current anti-virus simulations: the need for background traffic. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF background traffic, virus-spread simulation
20Minh Nhat Quang Truong, Van Kiem Hoang, Thuy Thanh Nguyen Using null data processing to recognize variant computer viruses for rule-based anti-virus systems. Search on Bibsonomy GrC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok Avfs: An On-Access Anti-Virus File System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2004 DBLP  BibTeX  RDF
20David Harley Massmailers: New Threats Need Novel Anti-Virus Measures. Search on Bibsonomy ISSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20John Gordineer Blended Threats: A New Era in Anti-Virus Protection. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ken Dunham Evaluating Anti-Virus Software: Which Is Best? Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Joseph S. Sherif, David P. Gilliam Deployment of anti-virus software: a case study. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Gerald V. Post, Albert Kagan Management tradeoffs in anti-virus strategies. Search on Bibsonomy Inf. Manag. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Gerald Post, Albert Kagan The use and effectiveness of anti-virus software. Search on Bibsonomy Comput. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Vesselin Bontchev Methodology of computer anti-virus research. Search on Bibsonomy 1998   RDF
20Lynn Fox Helping teachers use anti-virus sites on the World Wide Web. Search on Bibsonomy WebNet The full citation details ... 1996 DBLP  BibTeX  RDF
20Rebecca Herold A Corporate Anti-Virus Strategy. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Michael I. Sobol Anti-Virus Software. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20 Computer viruses and anti-virus warfare: 2nd revised edition, by Jan Hruska (1992), Ellis Horwood limited, soft-cover, 224 p (£19.95), ISBN 0-13-036-377-4. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Mikael Larsson Fighting the Viruses: Practical Anti-Virus Training. Search on Bibsonomy SEC The full citation details ... 1993 DBLP  BibTeX  RDF
20Alvaro Hermida HEmut-PoliCaza: Introducing Ada in the University Through PC Anti-Virus Software Development. Search on Bibsonomy TRI-Ada The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Ada
16Jusuk Lee, Kyoochang Jeong, Heejo Lee Detecting metamorphic malwares using code graphs. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code graph, metamorphic malware, static analysis, code obfuscation
16Yanfang Ye 0001, Tao Li 0001, Yong Chen, Qingshan Jiang Automatic malware categorization using cluster ensemble. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF malware categorization, signature, cluster ensemble
16Ashish Goel, Pankaj Gupta 0002 Small subset queries and bloom filters using ternary associative memories, with applications. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF subset queries, bloom filters, TCAM
16Keehyung Kim, Byung Ro Moon Malware detection based on dependency graph using hybrid genetic algorithm. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF genetic algorithm, dependency graph, malware detection, subgraph isomorphism
16Matt Webster, Grant Malcolm Detection of metamorphic and virtualization-based malware using algebraic specification. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala Fragmented malware through RFID and its defenses. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Peishun Liu, Xuefang Wang Identification of Malicious Web Pages by Inductive Learning. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious detection, generalization, specialization, inductive learning, drive-by downloads
16Xin Hu 0001, Tzi-cker Chiueh, Kang G. Shin Large-scale malware indexing using function-call graphs. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF graph similarity, malware indexing, multi-resolution indexing
16Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng Information Security Monitoring System Based on Data Mining. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 DROP: Detecting Return-Oriented Programming Malicious Code. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Dmitriy Komashinskiy, Igor V. Kotenko Integrated Usage of Data Mining Methods for Malware Detection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Behavior-based malware detection, Data mining, Malware
16Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Using Formal Grammar and Genetic Operators to Evolve Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Steffen Schulz 0001, Ahmad-Reza Sadeghi Secure VPNs for Trusted Computing Environments. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel mode, Information security, malware, Windows, rootkit
16Hessam S. Sarjoughian, Vignesh Elamvazhuthi CoSMoS: a visual environment for component-based modeling, experimental design, and simulation. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DEVS-suite, M&S lifecycle, visual modeling, CoSMoS
16Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng Stealthy video capturer: a new video-based spyware in 3G smartphones. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3g smartphones, security, privacy, spyware
16Tich Phuoc Tran, Pohsiang Tsai, Tony Jan A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jostein Jensen A Novel Testbed for Detection of Malicious Software Functionality. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF testbed, malware, honeypot, behavioural analysis
16Cynthia A. Sanders Coming down the e-mail mountain, blazing a trail to gmail. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ClamAV, Gmail, IronMail, Microsoft® live, OCApps, OCMail, ObieMail, iPlanet/SunONE, collaboration, spam, instant messaging, e-mail, Google, LDAP, blackboard, POP, IMAP
16Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Petrini High-speed string searching against large dictionaries on the Cell/B.E. Processor. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wei Huang, Yu Meisheng The Quickly Solving Method of File Recovery in Windows Environment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo Unknown Malicious Executables Detection Based on Run-Time Behavior. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Polymorphic Worm Detection, Abstract Payload Execution
16Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee Lares: An Architecture for Secure Active Monitoring Using Virtualization. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtualization, active monitoring, introspection
16Urs E. Gattiker Bologna process revisited: educating information security and malware experts. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Accurate Application-Specific Sandboxing for Win32/Intel Binaries. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF taxonomy of worm, worm packet flows, ubiquitous security, temporal behavior
16Olivier Henchiri, Nathalie Japkowicz A Feature Selection and Evaluation Scheme for Computer Virus Detection. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Naomi Fujimura, Zen-ichi Hirayama, Tatsuya Oka, Masato Komori Implementation and experience with the terminal registration system with web interface. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF static IP address, terminal registration, networking, personal computing, web-based, system configuration, DHCP
16Erkut Sinan Ayla, Attila Ozgit An architecture for end-to-end and inter-domain trusted mail delivery service. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling The Nepenthes Platform: An Efficient Approach to Collect Malware. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue A tool for analyzing and detecting malicious mobile code. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OS execution emulation, code simulation, static code analysis, malicious code detection
16Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im A New Methodology of Analyzing Security Vulnerability for Network Services. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh How to Automatically and Accurately Sandbox Microsoft IIS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao Hunting Trojan Horses. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow control, program monitoring, run time environment, data labeling
16Lorrie Faith Cranor Towards usable Web privacy and security. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Kanliang Wang, Yuan Wang, Jingtao Yao 0001 A Comparative Study on Marketing Mix Models for Digital Products. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Stephen Wassef, Rodrigo Reis, Dragan Lazin ResNet management: Wayne State University's experience supporting cisco clean access agent. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LDAP ID used for network authentication, M*A*S*H - a great TV series used to name our PC clinics (MASH), WSU accessID, cisco clean access agent (CCAA), digital millennium copyright act (DMCA), dynamic host configuration protocol (DHCP), lightweight directory access protocol (LDAP), motion picture association of America (MPAA), recording industry association of America (RIAA)
16Joni Mason, Marilee Tuomanen TECH spyware raid: the PEA matrix. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residential, education, spyware, adware
16James C. Reynolds, James E. Just, Larry A. Clough, Ryan Maglich On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi 0001, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe AnZenMail: A Secure and Certified E-mail System. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Dimitrios N. Serpanos, Richard J. Lipton Defense Against Man-in-the-Middle Attack in Client-Server Systems. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo Data Mining Methods for Detection of New Malicious Executables. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #177 of 177 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license