Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Patrick Stewin, Iurii Bystrov |
Understanding DMA Malware. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz |
SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Schreck, Stefan Berger, Jan Göbel |
BISSAM: Automatic Vulnerability Identification of Office Documents. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu |
Using File Relationships in Malware Classification. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Min Zheng, Patrick P. C. Lee, John C. S. Lui |
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin |
An Assessment of Overt Malicious Activity Manifest in Residential Networks. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thorsten Holz, Herbert Bos (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna |
Escape from Monkey Island: Evading High-Interaction Honeyclients. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Su Zhang, Xinming Ou, John Homer |
Effective Network Vulnerability Assessment through Model Abstraction. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu |
Reverse Social Engineering Attacks in Online Social Networks. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson |
What's Clicking What? Techniques and Innovations of Today's Clickbots. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti |
Operating System Interface Obfuscation and the Revealing of Hidden Operations. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Malek Ben Salem 0001, Salvatore J. Stolfo |
Decoy Document Deployment for Effective Masquerade Attack Detection. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns, Sebastian Lekies |
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sebastiano Di Paola, Dario Lombardo |
Protecting against DNS Reflection Attacks with Bloom Filters. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chuan Yue |
Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Code Pointer Masking: Hardening Applications against Code Injection Attacks. |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhang 0001, Simone Fischer-Hübner |
Timing Attacks on PIN Input in VoIP Networks (Short Paper). |
DIMVA |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna |
Organizing Large Scale Hacking Competitions. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jingyu Hua, Kouichi Sakurai |
Modeling and Containment of Search Worms Targeting Web Applications. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
Conqueror: Tamper-Proof Code Execution on Legacy Systems. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee |
Evaluating Bluetooth as a Medium for Botnet Command and Control. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro |
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani 0001 |
An Online Adaptive Approach to Alert Correlation. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nick Nikiforakis, Yves Younan, Wouter Joosen |
HProxy: Client-Side Detection of SSL Stripping Attacks. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hanno Fallmann, Gilbert Wondracek, Christian Platzer |
Covertly Probing Underground Economy Marketplaces. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Heng Yin 0001, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song |
HookScout: Proactive Binary-Centric Hook Detection. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sasa Mrdovic, Branislava Perunicic-Drazenovic |
KIDS - Keyed Intrusion Detection System. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adam Doupé, Marco Cova, Giovanni Vigna |
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Kreibich, Marko Jahnke (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti, Ulrich Bayer |
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection. |
DIMVA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter |
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Application fingerprinting, traffic deanonymization, machine learning, malware detection |
1 | Makoto Shimamura, Kenji Kono |
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Network-level code emulation, Memory-scanning attack, Intrusion detection, Code-injection attack, Intrusion analysis |
1 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
1 | Jan Göbel, Thorsten Holz, Philipp Trinius |
Towards Proactive Spam Filtering (Extended Abstract). |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Bockermann, Martin Apel, Michael Meier 0001 |
Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
1 | François Gagnon, Frédéric Massicotte, Babak Esfandiari |
Using Contextual Information for IDS Alarm Classification (Extended Abstract). |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Flegel, Danilo Bruschi (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Lin, Ryan D. Riley, Dongyan Xu |
Polymorphing Software by Randomizing Data Structure Layout. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jin Han, Debin Gao, Robert H. Deng |
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero |
Selecting and Improving System Call Models for Anomaly Detection. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models |
1 | Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni |
How Good Are Malware Detectors at Remediating Infected Systems?. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
software testing, Malware, malware detection |
1 | Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka |
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Youngsang Shin, Steven A. Myers, Minaxi Gupta |
A Case Study on Asprox Infection Dynamics. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Asprox, Security, Malware, SQL Injection |
1 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
1 | Prithvi Bisht, V. N. Venkatakrishnan |
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention, Security, Filtering, Cross-site scripting (XSS) |
1 | Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga |
On Race Vulnerabilities in Web Applications. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary |
The Quest for Multi-headed Worms. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carrie Gates, John McHugh |
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
Embedded Malware Detection Using Markov n-Grams. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 |
On the Limits of Information Flow Techniques for Malware Analysis and Containment. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Diego Zamboni (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi |
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Bhatkar, R. Sekar 0001 |
Data Space Randomization. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
address space randomization, buffer overflow, memory error |
1 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Dynamic Binary Instrumentation-Based Framework for Malware Defense. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware |
1 | Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson |
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof M. Brzezinski |
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract). |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eric Medvet, Alberto Bartoli |
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan |
Extensible Web Browser Security. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns, Justus Winter |
Protecting the Intranet Against "JavaScript Malware" and Related Attacks. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard M. Hämmerli, Robin Sommer (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis |
A Study of Malcode-Bearing Documents. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Sandbox Diversity, Intrusion Detection, N-gram |
1 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
1 | Jon Oberheide, Manish Karir, Zhuoqing Morley Mao |
Characterizing Dark DNS Behavior. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
darknets, sensors, honeypots, DNS, reconnaissance |
1 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
1 | David R. Piegdon, Lexi Pimenidis |
Targeting Physically Addressable Memory. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bojan Zdrnja, Nevil Brownlee, Duane Wessels |
Passive Monitoring of DNS Anomalies. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Stinson, John C. Mitchell |
Characterizing Bots' Remote Control Behavior. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner |
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
Bro, detection, worm, Scan, gateway, VPN |
1 | Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee |
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck, Pavel Laskov |
Detecting Unknown Network Attacks Using Language Models. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige |
A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz 0001, Karl N. Levitt, Matt Bishop |
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Liangwen Chen, Masayoshi Aritsugi |
An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer |
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Lorenzo Martignoni, Mattia Monga |
Detecting Self-mutating Malware Using Control-Flow Graph Matching. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel |
Using Static Program Analysis to Aid Intrusion Detection. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-Level Polymorphic Shellcode Detection Using Emulation. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens |
Using Contextual Security Policies for Threat Response. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Roland Büschkes, Pavel Laskov (eds.) |
Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Suraiya Khan, Issa Traoré |
A Prevention Model for Algorithmic Complexity Attacks. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Julisch, Christopher Krügel (eds.) |
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
METAL - A Tool for Extracting Attack Manifestations. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Automated attack analysis, log data, intrusion detection, system calls |
1 | Mario Latendresse |
Masquerade Detection via Customized Grammars. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer |
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Udo Payer, Peter Teufl, Mario Lamberger |
Hybrid Engine for Polymorphic Shellcode Detection. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
polymorphic shellcode detection, neural networks, Intrusion Detection |
1 | Fabien Pouget, Thorsten Holz |
A Pointillist Approach for Comparing Honeypots. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson |
TCPtransform: Property-Oriented TCP Traffic Transformation. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Fredrik Valeur, Darren Mutz, Giovanni Vigna |
A Learning-Based Approach to the Detection of SQL Attacks. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Meier 0001, Sebastian Schmerl, Hartmut König |
Improving the Efficiency of Misuse Detection. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith |
Detecting Malicious Code by Model Checking. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Model Checking, Malware Detection |