The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
49Ting-Fang Yen, Michael K. Reiter Traffic Aggregation for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Lionel Litty, David Lie Manitou: a layer-below approach to fighting malware. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Manitou, malware protection, malware removal, security architecture
45Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang Mapping kernel objects to enable systematic integrity checking. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel integrity, memory analysis, malware, pointer analysis, introspection
45Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stealth malware, hardware-assisted VMM, Virtual machine monitor
44Grégoire Jacob, Hervé Debar, Eric Filiol Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Interpretation, Malware, Behaviors, Attribute-Grammars
44Muazzam Siddiqui, Morgan C. Wang, Joohan Lee A survey of data mining techniques for malware detection using file features. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instruction sequences, data mining, machine learning, survey, N-grams, system calls, malware detection
44Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF polymorphic malware, metamorphic malware, zero-day malware, web server, vulnerability, exploit
41Vanessa Gratzer, David Naccache Alien vs. Quine. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
40N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Can we certify systems for freedom from malware. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
40Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia Constructing malware normalizers using term rewriting. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang An intelligent PE-malware detection system based on association mining. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Grégoire Jacob, Eric Filiol, Hervé Debar Malware as interaction machines: a new framework for behavior modelling. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Michele Colajanni, Daniele Gozzi, Mirco Marchetti Collaborative architecture for malware detection and analysis. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park Behavioral detection of malware on mobile handsets. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile handsets, security, machine learning, worm detection
40M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq Improving accuracy of immune-inspired malware detectors by using intelligent features. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network endpoints, support vector machines, artificial immune system, adaptive neuro fuzzy inference system, negative selection, dendritic cell algorithm
40Danilo Bruschi, Lorenzo Martignoni, Mattia Monga Code Normalization for Self-Mutating Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Robert Lyda, James Hamrock Using Entropy Analysis to Find Encrypted and Packed Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Jérôme François, Radu State, Olivier Festor Malware Models for Network and Service Management. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum RFID malware: truth vs. myth. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Yanjun Wu, Wenchang Shi Portal monitoring based anti-malware framework: design and implementation. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis On the impact of dynamic addressing on malware propagation. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private address space, network security, internet worms, network address translation
40Krishna K. Ramachandran, Biplab Sikdar 0001 Modeling malware propagation in Gnutella type peer-to-peer networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia Normalizing Metamorphic Malware Using Term Rewriting. Search on Bibsonomy SCAM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Eric Filiol, Grégoire Jacob, Mickaël Le Liard Evaluation methodology and theoretical model for antiviral behavioural detection strategies. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Black-box analysis, Metamorphism, Detection model, Polymorphism, Malware, Malware detection, Antivirus
38Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 On the Limits of Information Flow Techniques for Malware Analysis and Containment. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi Model-driven Timing Consistency for Active Malware Redirection. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Antoine Lemay, Sylvain P. Leblanc Is eval () Evil : A study of JavaScript in PDF malware. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber 0001, Spiros Mancoridis Malware Anomaly Detection on Virtual Assistants. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Shahrear Iqbal, Mohammad Zulkernine SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Bander Alsulami, Spiros Mancoridis Behavioral Malware Classification using Convolutional Recurrent Neural Networks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis Lightweight behavioral malware detection for windows platforms. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber 0001, Spiros Mancoridis Behavioral anomaly detection of malware on home routers. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet GPFinder: Tracking the invisible in Android malware. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Arun Lakhotia, Paul Black Mining malware secrets. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa Predicting signatures of future malware variants. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni Android malware family classification based on resource consumption over time. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Julian L. Rrushi Phantom I/O projector: Entrapping malware on machines in production. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha Kali: Scalable encryption fingerprinting in dynamic malware traces. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Richard Zak, Edward Raff, Charles Nicholas What can N-grams learn for malware detection? Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do On periodic behavior of malware: experiments, opportunities and challenges. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb DySign: dynamic fingerprinting for the automatic detection of android malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Lichao Sun 0001, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan SigPID: significant permission identification for android malware detection. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Luke Jones, Andrew J. Sellers, Martin C. Carlisle CARDINAL: similarity analysis to defeat malware compiler variations. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 Advanced transcriptase for JavaScript malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Matthew Ping, Bander Alsulami, Spiros Mancoridis On the effectiveness of application characteristics in the automatic classification of malware on smartphones. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Jason Upchurch, Xiaobo Zhou 0002 Malware provenance: code reuse detection in malicious software at scale. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Paul Black, Joseph Opacki Anti-analysis trends in banking malware. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner A framework for empirical evaluation of malware detection resilience against behavior obfuscation. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott Segmented sandboxing - A novel approach to Malware polymorphism detection. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto Clustering android malware families by http traffic. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38David De Lille, Bart Coppens 0001, Daan Raman, Bjorn De Sutter Automatically combining static malware detection techniques. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra Sandboxing and reasoning on malware infection trees. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Xingsi Zhong, Yu Fu 0005, Lu Yu 0001, Richard R. Brooks, Ganesh Kumar Venayagamoorthy Stealthy malware traffic - Not as innocent as it looks. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Joshua Saxe, Konstantin Berlin Deep neural network based malware detection using two dimensional binary program features. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Jason Upchurch, Xiaobo Zhou 0002 Variant: a malware similarity testing framework. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Thomas Barabosch, Elmar Gerhards-Padilla Host-based code injection attacks: A popular technique used by malware. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Mark E. Fioravanti II, Richard Ford Bacterial quorum sensing for coordination of targeted malware. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Fanny Lalonde Lévesque, José M. Fernandez 0001, Anil Somayaji Risk prediction of malware victimization based on user behavior. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Joshua Saxe, Rafael Turner, Kristina Blokhin CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas Identifying malware genera using the Jensen-Shannon distance between system call traces. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch Heuristic malware detection via basic block comparison. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan Synthesizing near-optimal malware specifications from suspicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Hongyuan Qiu, Fernando C. Colón Osorio Static malware detection with Segmented Sandboxing. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Gen Lu, Karan Chadha, Saumya K. Debray A simple client-side defense against environment-dependent web-based malware. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Rafael Fedler, Marcel Kulicke, Julian Schütte An antivirus API for Android malware recognition. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici Noninvasive detection of anti-forensic malware. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Jacob Ouellette, Avi Pfeffer, Arun Lakhotia Countering malware evolution using cloud-based learning. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Tommy Blizard, Nikola Livic Click-fraud monetizing malware: A survey and case study. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38John Spaulding, Alyssa Krauss, Avinash Srinivasan Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Andrew Walenstein, Arun Lakhotia A transformation-based model of malware derivation. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert 0001 Smartphone malware detection: From a survey towards taxonomy. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Jonghoon Kwon, Heejo Lee BinGraph: Discovering mutant malware using hierarchical semantic signatures. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Avi Pfeffer, Catherine Call, John Chamberlain, Lee Kellogg, Jacob Ouellette, Terry Patten, Greg Zacharias, Arun Lakhotia, Suresh Golconda, John Bay, Robert Hall, Daniel Scofield Malware Analysis and attribution using Genetic Information. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Marco Ramilli, Matt Bishop, Shining Sun Multiprocess malware. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Frankie Li, Anthony Lai, DDL Evidence of Advanced Persistent Threat: A case study of malware for political espionage. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Rodrigo Rubira Branco, Gabriel Negreira Barbosa Distributed malware analysis scheduling. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani 0001 Exploring network-based malware classification. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Jose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu Building malware infection trees. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Anshuman Singh, Arun Lakhotia Game-theoretic design of an information exchange model for detecting packed malware. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh Memory behavior-based automatic malware unpacking in stealth debugging environment. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Marco Ramilli, Matt Bishop Multi-stage delivery of malware. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Rodrigo Rubira Branco, Udi Shamir Architecture for automation of malware analysis. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Kurt Thomas, David M. Nicol The Koobface botnet and the rise of social malware. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu Evaluating detection and treatment effectiveness of commercial anti-malware programs. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis GPU-assisted malware. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Shanhu Shang, Ning Zheng 0001, Jian Xu 0001, Ming Xu 0001, Haiping Zhang Detecting malware variants via function-call graph similarity. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Ronghua Tian, Md. Rafiqul Islam 0001, Lynn Margaret Batten, Steven Versteeg Differentiating malware from cleanware using behavioural analysis. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers Header information in malware families and impact on automated classifiers. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak, Can Yildizli Smartphone malware evolution revisited: Android next target? Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak Detecting Symbian OS malware through static function call analysis. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Felix Leder, Bastian Steinbock, Peter Martini Classification and detection of metamorphic malware using value set analysis. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Mohammad Reza Faghani, Hossein Saidi 0001 Malware propagation in Online Social Networks. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Joan Calvet, Carlton R. Davis, Pierre-Marc Bureau Malware authors don't learn, and that's good! Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license