|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 174 occurrences of 133 keywords
|
|
|
Results
Found 177 publication records. Showing 177 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Byungho Min, Vijay Varadharajan |
Design, implementation and evaluation of a novel anti-virus parasitic malware. |
SAC |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Nguyen Hoang Thuan, Pedro Antunes 0001, David Johnstone 0001, Minh Nhat Quang Truong |
An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base. |
FDSE |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Umakant Mishra |
How do Viruses Attack Anti-Virus Programs. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
20 | Umakant Mishra |
Protecting Anti-virus Programs From Viral Attacks. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
20 | Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki |
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. |
NBiS |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Yan Ma, Mehrdad Sepehri Sharbaf |
Investigation of Static and Dynamic Android Anti-virus Strategies. |
ITNG |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Wei Yan, Nirwan Ansari |
Anti-virus in-the-cloud service: are we ready for the security evolution? |
Secur. Commun. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Min Zheng, Patrick P. C. Lee, John C. S. Lui |
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Orestis Tsigkas, Dimitrios Tzovaras |
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Lihua Wu, Yu Zhang 0003 |
Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing. |
ACIS-ICIS |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Nen-Fu Huang, Chia-Nan Kao, Rong-Tai Liu |
A novel software-based MD5 checksum lookup scheme for anti-virus systems. |
IWCMC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Ding-Long Huang, Pei-Luen Patrick Rau, Hui Su, Nan Tu, Chen Zhao |
Effects of communication style and time orientation on notification systems and anti-virus software. |
Behav. Inf. Technol. |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. |
login Usenix Mag. |
2010 |
DBLP BibTeX RDF |
|
20 | Nen-Fu Huang, Wen-Yen Tsai |
SHOCK: A Worst-Case Ensured Sub-Linear Time Pattern Matching Algorithm for Inline Anti-Virus Scanning. |
ICC |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. |
LEET |
2010 |
DBLP BibTeX RDF |
|
20 | Wyman Stocks |
When Anti-virus Doesn't Cut It: Catching Malware with SIEM. |
LISA |
2010 |
DBLP BibTeX RDF |
|
20 | Wei Yan, Nirwan Ansari |
Why Anti-Virus Products Slow Down Your Machine? |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Tao Gong |
Anti-virus security and robustness of heterogeneous immune static network. |
QSHINE |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Attila Ondi |
A drawback of current anti-virus simulations: the need for background traffic. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
background traffic, virus-spread simulation |
20 | Minh Nhat Quang Truong, Van Kiem Hoang, Thuy Thanh Nguyen |
Using null data processing to recognize variant computer viruses for rule-based anti-virus systems. |
GrC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok |
Avfs: An On-Access Anti-Virus File System. |
USENIX Security Symposium |
2004 |
DBLP BibTeX RDF |
|
20 | David Harley |
Massmailers: New Threats Need Novel Anti-Virus Measures. |
ISSE |
2004 |
DBLP DOI BibTeX RDF |
|
20 | John Gordineer |
Blended Threats: A New Era in Anti-Virus Protection. |
Inf. Secur. J. A Glob. Perspect. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ken Dunham |
Evaluating Anti-Virus Software: Which Is Best? |
Inf. Secur. J. A Glob. Perspect. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Joseph S. Sherif, David P. Gilliam |
Deployment of anti-virus software: a case study. |
Inf. Manag. Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Gerald V. Post, Albert Kagan |
Management tradeoffs in anti-virus strategies. |
Inf. Manag. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Gerald Post, Albert Kagan |
The use and effectiveness of anti-virus software. |
Comput. Secur. |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Vesselin Bontchev |
Methodology of computer anti-virus research. |
|
1998 |
RDF |
|
20 | Lynn Fox |
Helping teachers use anti-virus sites on the World Wide Web. |
WebNet |
1996 |
DBLP BibTeX RDF |
|
20 | Rebecca Herold |
A Corporate Anti-Virus Strategy. |
Int. J. Netw. Manag. |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Michael I. Sobol |
Anti-Virus Software. |
Inf. Secur. J. A Glob. Perspect. |
1994 |
DBLP DOI BibTeX RDF |
|
20 | |
Computer viruses and anti-virus warfare: 2nd revised edition, by Jan Hruska (1992), Ellis Horwood limited, soft-cover, 224 p (£19.95), ISBN 0-13-036-377-4. |
Comput. Law Secur. Rev. |
1993 |
DBLP DOI BibTeX RDF |
|
20 | Mikael Larsson |
Fighting the Viruses: Practical Anti-Virus Training. |
SEC |
1993 |
DBLP BibTeX RDF |
|
20 | Alvaro Hermida |
HEmut-PoliCaza: Introducing Ada in the University Through PC Anti-Virus Software Development. |
TRI-Ada |
1992 |
DBLP DOI BibTeX RDF |
Ada |
16 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
16 | Yanfang Ye 0001, Tao Li 0001, Yong Chen, Qingshan Jiang |
Automatic malware categorization using cluster ensemble. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
malware categorization, signature, cluster ensemble |
16 | Ashish Goel, Pankaj Gupta 0002 |
Small subset queries and bloom filters using ternary associative memories, with applications. |
SIGMETRICS |
2010 |
DBLP DOI BibTeX RDF |
subset queries, bloom filters, TCAM |
16 | Keehyung Kim, Byung Ro Moon |
Malware detection based on dependency graph using hybrid genetic algorithm. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
genetic algorithm, dependency graph, malware detection, subgraph isomorphism |
16 | Matt Webster, Grant Malcolm |
Detection of metamorphic and virtualization-based malware using algebraic specification. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala |
Fragmented malware through RFID and its defenses. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Peishun Liu, Xuefang Wang |
Identification of Malicious Web Pages by Inductive Learning. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
Malicious detection, generalization, specialization, inductive learning, drive-by downloads |
16 | Xin Hu 0001, Tzi-cker Chiueh, Kang G. Shin |
Large-scale malware indexing using function-call graphs. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
graph similarity, malware indexing, multi-resolution indexing |
16 | Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng |
Information Security Monitoring System Based on Data Mining. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 |
DROP: Detecting Return-Oriented Programming Malicious Code. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Dmitriy Komashinskiy, Igor V. Kotenko |
Integrated Usage of Data Mining Methods for Malware Detection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Behavior-based malware detection, Data mining, Malware |
16 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Using Formal Grammar and Genetic Operators to Evolve Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Steffen Schulz 0001, Ahmad-Reza Sadeghi |
Secure VPNs for Trusted Computing Environments. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
16 | Hessam S. Sarjoughian, Vignesh Elamvazhuthi |
CoSMoS: a visual environment for component-based modeling, experimental design, and simulation. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
DEVS-suite, M&S lifecycle, visual modeling, CoSMoS |
16 | Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng |
Stealthy video capturer: a new video-based spyware in 3G smartphones. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
3g smartphones, security, privacy, spyware |
16 | Tich Phuoc Tran, Pohsiang Tsai, Tony Jan |
A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jostein Jensen |
A Novel Testbed for Detection of Malicious Software Functionality. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
testbed, malware, honeypot, behavioural analysis |
16 | Cynthia A. Sanders |
Coming down the e-mail mountain, blazing a trail to gmail. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
ClamAV, Gmail, IronMail, Microsoft® live, OCApps, OCMail, ObieMail, iPlanet/SunONE, collaboration, spam, instant messaging, e-mail, Google, LDAP, blackboard, POP, IMAP |
16 | Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Petrini |
High-speed string searching against large dictionaries on the Cell/B.E. Processor. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wei Huang, Yu Meisheng |
The Quickly Solving Method of File Recovery in Windows Environment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Polymorphic Worm Detection, Abstract Payload Execution |
16 | Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee |
Lares: An Architecture for Secure Active Monitoring Using Virtualization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
virtualization, active monitoring, introspection |
16 | Urs E. Gattiker |
Bologna process revisited: educating information security and malware experts. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Accurate Application-Specific Sandboxing for Win32/Intel Binaries. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon |
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
taxonomy of worm, worm packet flows, ubiquitous security, temporal behavior |
16 | Olivier Henchiri, Nathalie Japkowicz |
A Feature Selection and Evaluation Scheme for Computer Virus Detection. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Naomi Fujimura, Zen-ichi Hirayama, Tatsuya Oka, Masato Komori |
Implementation and experience with the terminal registration system with web interface. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
static IP address, terminal registration, networking, personal computing, web-based, system configuration, DHCP |
16 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling |
The Nepenthes Platform: An Efficient Approach to Collect Malware. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue |
A tool for analyzing and detecting malicious mobile code. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
OS execution emulation, code simulation, static code analysis, malicious code detection |
16 | Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im |
A New Methodology of Analyzing Security Vulnerability for Network Services. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
How to Automatically and Accurately Sandbox Microsoft IIS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao |
Hunting Trojan Horses. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
information flow control, program monitoring, run time environment, data labeling |
16 | Lorrie Faith Cranor |
Towards usable Web privacy and security. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Kanliang Wang, Yuan Wang, Jingtao Yao 0001 |
A Comparative Study on Marketing Mix Models for Digital Products. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Stephen Wassef, Rodrigo Reis, Dragan Lazin |
ResNet management: Wayne State University's experience supporting cisco clean access agent. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
LDAP ID used for network authentication, M*A*S*H - a great TV series used to name our PC clinics (MASH), WSU accessID, cisco clean access agent (CCAA), digital millennium copyright act (DMCA), dynamic host configuration protocol (DHCP), lightweight directory access protocol (LDAP), motion picture association of America (MPAA), recording industry association of America (RIAA) |
16 | Joni Mason, Marilee Tuomanen |
TECH spyware raid: the PEA matrix. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
residential, education, spyware, adware |
16 | James C. Reynolds, James E. Just, Larry A. Clough, Ryan Maglich |
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi 0001, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe |
AnZenMail: A Secure and Certified E-mail System. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Dimitrios N. Serpanos, Richard J. Lipton |
Defense Against Man-in-the-Middle Attack in Client-Server Systems. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo |
Data Mining Methods for Detection of New Malicious Executables. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #177 of 177 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|