The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DIMVA"( http://dblp.L3S.de/Venues/DIMVA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dimva

Publication years (Num. hits)
2004 (15) 2005 (15) 2006-2007 (27) 2008 (15) 2009-2010 (27) 2011-2012 (28) 2013-2014 (29) 2015 (18) 2016 (22) 2017 (19) 2018 (19) 2019 (24) 2020-2021 (34) 2022-2023 (26)
Publication types (Num. hits)
inproceedings(298) proceedings(20)
Venues (Conferences, Journals, ...)
DIMVA(318)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 39 keywords

Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan No Random, No Ransom: A Key to Stop Cryptographic Ransomware. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aurore Fass, Robert P. Krawczyk, Michael Backes 0001, Ben Stock JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Boris Zadov, Yuval Elovici LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paria Shirani, Lingyu Wang 0001, Mourad Debbabi BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert 0001 Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yizheng Chen 0001, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon Measuring Network Reputation in the Ad-Bidding Process. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever Unsupervised Detection of APT C&C Channels using Web Request Graphs. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lingguang Lei, Jianhua Sun, Kun Sun 0001, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li 0002 SPEAKER: Split-Phase Execution of Application Containers. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olivier Heen, Christoph Neumann 0001 On the Privacy Impacts of Publicly Leaked Password Databases. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michalis Polychronakis, Michael Meier 0001 (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shruti Tople, Prateek Saxena On the Trade-Offs in Oblivious Execution Techniques. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero Measuring and Defeating Anti-Instrumentation-Equipped Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sam L. Thomas, Flavio D. Garcia, Tom Chothia HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard Malware Guard Extension: Using SGX to Conceal Cache Attacks. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deqing Zou, Hanchao Qi, Zhen Li 0027, Song Wu 0001, Hai Jin 0001, Guozhong Sun, Sujuan Wang, Yuyi Zhong SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou Deep Ground Truth Analysis of Current Android Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua DynODet: Detecting Dynamic Obfuscation in Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mark Luchs, Christian Doerr Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert 0001 Adaptive Semantics-Aware Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Gruss, Clémentine Maurice, Klaus Wagner 0001, Stefan Mangard Flush+Flush: A Fast and Stealthy Cache Attack. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Konstantin Böttinger, Claudia Eckert 0001 DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Hupperich, Henry Hosseini, Thorsten Holz Leveraging Sensor Fingerprinting for Mobile Device Authentication. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis Understanding the Privacy Implications of ECS - (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti Subverting Operating System Properties Through Evolutionary DKOM Attacks. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yizheng Chen 0001, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wanpeng Li, Chris J. Mitchell Analysing the Security of Google's Implementation of OpenID Connect. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Gruss, Clémentine Maurice, Stefan Mangard Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck Comprehensive Analysis and Detection of Flash-Based Malware. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz 0001, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu 0002, George Yiu, Anthony D. Joseph, J. D. Tygar Reviewer Integration and Performance Measurement for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andre Pawlowski, Moritz Contag, Thorsten Holz Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenyi Huang, Jack W. Stokes MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz Detile: Fine-Grained Information Leak Detection in Script Engines. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert Towards Vulnerability Discovery Using Staged Program Analysis. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Brengel, Michael Backes 0001, Christian Rossow Detecting Hardware-Assisted Virtualization. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti Google Dorks: Analysis, Creation, and New Defenses. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Strohmeier, Vincent Lenders, Ivan Martinovic Intrusion Detection for Airborne Communication Using PHY-Layer Information. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito Controlled Data Sharing for Collaborative Predictive Blacklisting. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gianluca Stringhini, Olivier Thonnard That Ain't You: Blocking Spearphishing Through Behavioral Modelling. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiao Han, Nizar Kheir, Davide Balzarotti The Role of Cloud Services in Malicious Software: Trends and Insights. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mathias Payer, Antonio Barresi, Thomas R. Gross Fine-Grained Control-Flow Integrity Through Binary Hardening. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1JingMin Huang, Gianluca Stringhini, Peng Yong Quit Playing Games with My Heart: Understanding Online Dating Scams. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld May I? - Content Security Policy Endorsement for Browser Extensions. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tobias Wüchner, Martín Ochoa, Alexander Pretschner Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Maurice, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon C5: Cross-Cores Cache Covert Channel. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuan Yang 0003, Zhongmin Cai, Weixuan Mao, Zhihai Yang Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos "Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1An Wang 0002, Aziz Mohaisen, Wentao Chang, Songqing Chen Capturing DDoS Attack Dynamics Behind the Scenes. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiao Zhang, Wenliang Du Attacks on Android Clipboard. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero Phoenix: DGA-Based Botnet Tracking and Intelligence. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martina Lindorfer, Stamatis Volanis, Alessandro Sisto 0001, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis AndRadar: Fast Discovery of Android Applications in Alternative Markets. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aziz Mohaisen, Omar Alrawi AV-Meter: An Evaluation of Antivirus Scans and Labels. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sven Dietrich (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tielei Wang, Chengyu Song, Wenke Lee Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer Identifying Shared Software Components to Support Malware Forensics. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anil Kurmus, Sergej Dechand, Rüdiger Kapitza Quantifiable Run-Time Kernel Attack Surface Reduction. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna PExy: The Other Side of Exploit Kits. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dennis Andriesse, Herbert Bos Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla Bee Master: Detecting Host-Based Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1René Rietz, Michael Vogel, Franka Schuster, Hartmut König Parallelization of Network Intrusion Detection Systems under Attack Conditions. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrew G. West, Aziz Mohaisen Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables). Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guanhua Yan, Nathan Brown, Deguang Kong Exploring Discriminatory Features for Automated Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Johns PreparedJS: Secure Script-Templates for JavaScript. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda Securing Legacy Firefox Extensions with SENTINEL. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nick Nikiforakis, Frank Piessens, Wouter Joosen HeapSentry: Kernel-Assisted Protection against Heap Overflows. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Antonio Nappa, M. Zubair Rafique, Juan Caballero Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Rossow, Christian J. Dietrich ProVeX: Detecting Botnets with Encrypted Command and Control Channels. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li 0001 PeerRush: Mining for Unwanted P2P Traffic. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Felix Schuster, Stefan Rüster, Thorsten Holz Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gen Lu, Saumya K. Debray Weaknesses in Defenses against Web-Borne Malware - (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ulrich Flegel, Evangelos P. Markatos, William K. Robertson (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Paul 0003, Franka Schuster, Hartmut König Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yehonatan Cohen, Daniel Gordon, Danny Hendler Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Karel Bartos, Martin Rehák, Michal Svoboda Self-organized Collaboration of Distributed IDS Sensors. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna Tracking Memory Writes for Malware Classification and Code Reuse Identification. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos System-Level Support for Intrusion Recovery. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elias Raftopoulos, Matthias Egli, Xenofontas A. Dimitropoulos Shedding Light on Log Correlation in Network Forensics Analysis. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian Rossow, Christian J. Dietrich, Herbert Bos Large-Scale Analysis of Malware Downloaders. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Brian Schulte, Haris Andrianakis, Kun Sun 0001, Angelos Stavrou NetGator: Malware Detection Using Program Interactive Challenges. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongzheng Wu, Roland H. C. Yap Experiments with Malware Visualization. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 318 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license