|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 207-227, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Lionel Litty, David Lie |
Manitou: a layer-below approach to fighting malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASID ![In: Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID 2006, San Jose, California, USA, October 21, 2006, pp. 6-11, 2006, ACM, 1-59593-576-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Manitou, malware protection, malware removal, security architecture |
45 | Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang |
Mapping kernel objects to enable systematic integrity checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 555-565, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, memory analysis, malware, pointer analysis, introspection |
45 | Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 |
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 361-375, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stealth malware, hardware-assisted VMM, Virtual machine monitor |
44 | Grégoire Jacob, Hervé Debar, Eric Filiol |
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 81-100, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Interpretation, Malware, Behaviors, Attribute-Grammars |
44 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
A survey of data mining techniques for malware detection using file features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 509-510, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
instruction sequences, data mining, machine learning, survey, N-grams, system calls, malware detection |
44 | Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez |
PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), Niagara Falls, New York, USA, September 27-30, 2009, pp. 91-99, 2009, IEEE Computer Society, 978-0-7695-3826-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
polymorphic malware, metamorphic malware, zero-day malware, web server, vulnerability, exploit |
41 | Vanessa Gratzer, David Naccache |
Alien vs. Quine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 26-31, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 468-482, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 19-23, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
40 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Can we certify systems for freedom from malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 175-178, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia |
Constructing malware normalizers using term rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 307-322, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 323-334, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Malware as interaction machines: a new framework for behavior modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(3), pp. 235-250, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Michele Colajanni, Daniele Gozzi, Mirco Marchetti |
Collaborative architecture for malware detection and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 79-93, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park |
Behavioral detection of malware on mobile handsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 225-238, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile handsets, security, machine learning, worm detection |
40 | M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
Improving accuracy of immune-inspired malware detectors by using intelligent features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 119-126, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network endpoints, support vector machines, artificial immune system, adaptive neuro fuzzy inference system, negative selection, dendritic cell algorithm |
40 | Danilo Bruschi, Lorenzo Martignoni, Mattia Monga |
Code Normalization for Self-Mutating Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 46-54, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Robert Lyda, James Hamrock |
Using Entropy Analysis to Find Encrypted and Packed Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 40-45, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jérôme François, Radu State, Olivier Festor |
Malware Models for Network and Service Management. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007, Proceedings, pp. 192-195, 2007, Springer, 978-3-540-72985-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
RFID malware: truth vs. myth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(4), pp. 70-72, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Yanjun Wu, Wenchang Shi |
Portal monitoring based anti-malware framework: design and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
On the impact of dynamic addressing on malware propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 51-56, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private address space, network security, internet worms, network address translation |
40 | Krishna K. Ramachandran, Biplab Sikdar 0001 |
Modeling malware propagation in Gnutella type peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia |
Normalizing Metamorphic Malware Using Term Rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 75-84, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Eric Filiol, Grégoire Jacob, Mickaël Le Liard |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(1), pp. 23-37, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Black-box analysis, Metamorphism, Detection model, Polymorphism, Malware, Malware detection, Antivirus |
38 | Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 |
On the Limits of Information Flow Techniques for Malware Analysis and Containment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 143-163, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas |
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 3-12, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Danny Kim, Daniel Mirsky, Amir Majlesi-Kupaei, Rajeev Barua |
A Hybrid Static Tool to Increase the Usability and Scalability of Dynamic Detection of Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 115-123, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Rory Klein, Tyler Barkley, Weston Clizbe, Jennifer Bateman, Julian L. Rrushi |
Model-driven Timing Consistency for Active Malware Redirection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 132-141, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Antoine Lemay, Sylvain P. Leblanc |
Is eval () Evil : A study of JavaScript in PDF malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 13-22, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber 0001, Spiros Mancoridis |
Malware Anomaly Detection on Virtual Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 124-131, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Shahrear Iqbal, Mohammad Zulkernine |
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 33-40, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Bander Alsulami, Spiros Mancoridis |
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 103-111, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton |
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018, pp. 49-58, 2018, IEEE, 978-1-7281-0155-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis |
Lightweight behavioral malware detection for windows platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 75-81, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber 0001, Spiros Mancoridis |
Behavioral anomaly detection of malware on home routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 47-54, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet |
GPFinder: Tracking the invisible in Android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 39-46, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Arun Lakhotia, Paul Black |
Mining malware secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 11-18, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Michael Howard, Avi Pfeffer, Mukesh Dalai, Michael Reposa |
Predicting signatures of future malware variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 126-132, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni |
Android malware family classification based on resource consumption over time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 31-38, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Julian L. Rrushi |
Phantom I/O projector: Entrapping malware on machines in production. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 57-66, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha |
Kali: Scalable encryption fingerprinting in dynamic malware traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 3-10, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Richard Zak, Edward Raff, Charles Nicholas |
What can N-grams learn for malware detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 109-118, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do |
On periodic behavior of malware: experiments, opportunities and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 85-92, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb |
DySign: dynamic fingerprinting for the automatic detection of android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 139-146, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Lichao Sun 0001, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan |
SigPID: significant permission identification for android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 59-66, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Luke Jones, Andrew J. Sellers, Martin C. Carlisle |
CARDINAL: similarity analysis to defeat malware compiler variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 39-46, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp 0001 |
Advanced transcriptase for JavaScript malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 121-128, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Matthew Ping, Bander Alsulami, Spiros Mancoridis |
On the effectiveness of application characteristics in the automatic classification of malware on smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 75-82, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Jason Upchurch, Xiaobo Zhou 0002 |
Malware provenance: code reuse detection in malicious software at scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 101-109, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Paul Black, Joseph Opacki |
Anti-analysis trends in banking malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 129-135, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Salvador Morales-Ortega, Ponciano Jorge Escamilla-Ambrosio, Abraham Rodriguez-Mota, Lilian D. Coronado-De-Alba |
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 67-74, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner |
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 40-47, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott |
Segmented sandboxing - A novel approach to Malware polymorphism detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 59-68, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto |
Clustering android malware families by http traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 128-135, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | David De Lille, Bart Coppens 0001, Daan Raman, Bjorn De Sutter |
Automatically combining static malware detection techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 48-55, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra |
Sandboxing and reasoning on malware infection trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 69-73, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Xingsi Zhong, Yu Fu 0005, Lu Yu 0001, Richard R. Brooks, Ganesh Kumar Venayagamoorthy |
Stealthy malware traffic - Not as innocent as it looks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 110-116, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Joshua Saxe, Konstantin Berlin |
Deep neural network based malware detection using two dimensional binary program features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 11-20, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Jason Upchurch, Xiaobo Zhou 0002 |
Variant: a malware similarity testing framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 31-39, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Thomas Barabosch, Elmar Gerhards-Padilla |
Host-based code injection attacks: A popular technique used by malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 8-17, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Mark E. Fioravanti II, Richard Ford |
Bacterial quorum sensing for coordination of targeted malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 101-108, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Fanny Lalonde Lévesque, José M. Fernandez 0001, Anil Somayaji |
Risk prediction of malware victimization based on user behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 128-134, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Joshua Saxe, Rafael Turner, Kristina Blokhin |
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 68-75, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas |
Identifying malware genera using the Jensen-Shannon distance between system call traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 1-7, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Francis Adkins, Luke Jones, Martin C. Carlisle, Jason Upchurch |
Heuristic malware detection via basic block comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 11-18, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Somesh Jha, Matthew Fredrikson, Mihai Christodorescu, Reiner Sailer, Xifeng Yan |
Synthesizing near-optimal malware specifications from suspicious behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 41-50, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Hongyuan Qiu, Fernando C. Colón Osorio |
Static malware detection with Segmented Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 132-141, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Gen Lu, Karan Chadha, Saumya K. Debray |
A simple client-side defense against environment-dependent web-based malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 124-131, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Rafael Fedler, Marcel Kulicke, Julian Schütte |
An antivirus API for Android malware recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 77-84, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici |
Noninvasive detection of anti-forensic malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 1-10, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Jacob Ouellette, Avi Pfeffer, Arun Lakhotia |
Countering malware evolution using cloud-based learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 85-94, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Tommy Blizard, Nikola Livic |
Click-fraud monetizing malware: A survey and case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 67-72, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | John Spaulding, Alyssa Krauss, Avinash Srinivasan |
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 87-93, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla |
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 46-53, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Andrew Walenstein, Arun Lakhotia |
A transformation-based model of malware derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 17-25, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert 0001 |
Smartphone malware detection: From a survey towards taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 79-86, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Jonghoon Kwon, Heejo Lee |
BinGraph: Discovering mutant malware using hierarchical semantic signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 104-111, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Avi Pfeffer, Catherine Call, John Chamberlain, Lee Kellogg, Jacob Ouellette, Terry Patten, Greg Zacharias, Arun Lakhotia, Suresh Golconda, John Bay, Robert Hall, Daniel Scofield |
Malware Analysis and attribution using Genetic Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 39-45, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Marco Ramilli, Matt Bishop, Shining Sun |
Multiprocess malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 8-13, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Frankie Li, Anthony Lai, DDL |
Evidence of Advanced Persistent Threat: A case study of malware for political espionage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 102-109, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Rodrigo Rubira Branco, Gabriel Negreira Barbosa |
Distributed malware analysis scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 34-41, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani 0001 |
Exploring network-based malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 14-20, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Jose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu |
Building malware infection trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 50-57, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Anshuman Singh, Arun Lakhotia |
Game-theoretic design of an information exchange model for detecting packed malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 1-7, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
38 | Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh |
Memory behavior-based automatic malware unpacking in stealth debugging environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 39-46, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Marco Ramilli, Matt Bishop |
Multi-stage delivery of malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 91-97, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Rodrigo Rubira Branco, Udi Shamir |
Architecture for automation of malware analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 106-112, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Kurt Thomas, David M. Nicol |
The Koobface botnet and the rise of social malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 63-70, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu |
Evaluating detection and treatment effectiveness of commercial anti-malware programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 31-38, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis |
GPU-assisted malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 1-6, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Shanhu Shang, Ning Zheng 0001, Jian Xu 0001, Ming Xu 0001, Haiping Zhang |
Detecting malware variants via function-call graph similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 113-120, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Ronghua Tian, Md. Rafiqul Islam 0001, Lynn Margaret Batten, Steven Versteeg |
Differentiating malware from cleanware using behavioural analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 23-30, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers |
Header information in malware families and impact on automated classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 15-22, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak, Can Yildizli |
Smartphone malware evolution revisited: Android next target? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 1-7, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak |
Detecting Symbian OS malware through static function call analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 15-22, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Felix Leder, Bastian Steinbock, Peter Martini |
Classification and detection of metamorphic malware using value set analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 39-46, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Mohammad Reza Faghani, Hossein Saidi 0001 |
Malware propagation in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 8-14, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Joan Calvet, Carlton R. Davis, Pierre-Marc Bureau |
Malware authors don't learn, and that's good! ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 88-97, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|