|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel 0001 |
Malware analysis with graph kernels and support vector machines. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Li Sun, Tim Ebringer, S. Boztag |
An automatic anti-anti-VMware technique applicable for multi-stage packed malware. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Ronghua Tian, Lynn Margaret Batten, Steven Versteeg |
Function length as a tool for malware classification. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
Morphological detection of malware. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Salvatore J. Stolfo, Ke Wang 0009, Wei-Jen Li |
Towards Stealthy Malware Detection. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Brian Witten, Carey Nachenberg |
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
Your botnet is my botnet: analysis of a botnet takeover. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
torpig, security, measurement, malware, botnet |
35 | M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information |
35 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
35 | Jostein Jensen |
A Novel Testbed for Detection of Malicious Software Functionality. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
testbed, malware, honeypot, behavioural analysis |
35 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
35 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
34 | Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
api calls, machine learning algorithms, markov chain, malware detection |
34 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
On the appropriateness of evolutionary rule learning algorithms for malware detection. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
learning classifier systems, malware detection, genetics based machine learning |
34 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Are evolutionary rule learning algorithms appropriate for malware detection? |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
malware detection, genetics based machine learning |
34 | Karthik Channakeshava, Deepti Chafekar, Keith R. Bisset, V. S. Anil Kumar 0001, Madhav V. Marathe |
EpiNet: a simulation framework to study the spread of malware in wireless networks. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
activity-based, wireless epidemics, Bluetooth, malware |
34 | Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter |
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Application fingerprinting, traffic deanonymization, machine learning, malware detection |
34 | Youngsang Shin, Steven A. Myers, Minaxi Gupta |
A Case Study on Asprox Infection Dynamics. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Asprox, Security, Malware, SQL Injection |
34 | Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 |
BotTracer: Execution-Based Bot-Like Malware Detection. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, Botnet, malware detection |
34 | Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta |
Scada Malware, a Proof of Concept. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
Security, Malware, Critical infrastructures, SCADA Systems |
34 | Vasileios Karyotis, Symeon Papavassiliou |
On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
attack strategies, malware spreading, ad hoc networks |
34 | Hanno Langweg |
Framework for malware resistance metrics. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
software architecture, malware, resistance |
34 | Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida |
Malware phylogeny generation using permutations of code. |
J. Comput. Virol. |
2005 |
DBLP DOI BibTeX RDF |
n-perms, evolution, permutation, Malware, worm, n-grams, virus, phylogeny, naming |
34 | Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith |
Detecting Malicious Code by Model Checking. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Model Checking, Malware Detection |
31 | Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
Preventing drive-by download via inter-module communication monitoring. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download |
31 | Hoai-Nam Nguyen, Yoichi Shinoda |
On Modeling Viral Diffusion in Heterogeneous Wireless Networks . |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
31 | Bret Michael 0001 |
Are Governments Up to the Task? |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh |
A Study of the Packer Problem and Its Solutions. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Eric Filiol, Sébastien Josse |
A statistical model for undecidable viral detection. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jörg Helbach, Jörg Schwenk |
Secure Internet Voting with Code Sheets. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Fast and Evasive Attacks: Highlighting the Challenges Ahead. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Network Worms, Network Security, Network Monitoring, Invasive Software |
31 | Mike Bond, George Danezis |
A pact with the devil. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Weidong Cui, Randy H. Katz, Wai-tian Tan |
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chun Wei, Alan P. Sprague, Gary Warner |
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensics, cyber crime |
29 | Yu Adachi, Yoshihiro Oyama |
Malware analysis system using process-level virtualization. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Hongying Tang, Bo Zhu 0001, Kui Ren 0001 |
A New Approach to Malware Detection. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Mirco Marchetti, Michele Messori, Michele Colajanni |
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Using Formal Grammar and Genetic Operators to Evolve Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Adam J. O'Donnell |
When Malware Attacks (Anything but Windows). |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Wei Yan, Zheng Zhang, Nirwan Ansari |
Revealing Packed Malware. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Martin Johns |
On JavaScript Malware and related threats. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 |
Automatically Identifying Trigger-based Behavior in Malware. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Rohan Monga, Kamalakar Karlapalem |
MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation. |
MABS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yiran Gu, Yurong Song, Guoping Jiang, Suoping Wang |
A New Susceptible-Infected Model of Malware Propagation in the Internet. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Weiqing Sun, R. Sekar 0001, Gaurav Poothia, Tejas Karandikar |
Practical Proactive Integrity Preservation: A Basis for Malware Defense. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Carsten Willems, Thorsten Holz, Felix C. Freiling |
Toward Automated Dynamic Malware Analysis Using CWSandbox. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Radu State, Olivier Festor |
Malware: a future framework for device, network and service management. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Holzer, Johannes Kinder, Helmut Veith |
Using Verification Technology to Specify and Detect Malware. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian |
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan |
Malware prevalence in the KaZaA file-sharing network. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
KaZaA, virus prevalence, peer-to-peer |
29 | |
13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018 |
MALWARE |
2018 |
DBLP BibTeX RDF |
|
29 | Julien Piet, Blake Anderson, David A. McGrew |
An In-Depth Study of Open-Source Command and Control Frameworks. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney |
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc |
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum |
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian |
Binary Obfuscation Based Reassemble. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001 |
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Asaf Hecht, Adi Sagi, Yuval Elovici |
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos |
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Bingyin Zhao, Yingjie Lao |
Resilience of Pruned Neural Network Against Poisoning Attack. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez |
PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. |
MALWARE |
2018 |
DBLP DOI BibTeX RDF |
|
29 | |
12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017 |
MALWARE |
2017 |
DBLP BibTeX RDF |
|
29 | Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou |
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Lu Yu 0001, Qing Wang 0047, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang |
TARN: A SDN-based traffic analysis resistant network architecture. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively |
Rootkit detection through phase-space analysis of power voltage measurements. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Kurt Baumgartner |
"Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon |
A virtual testbed for security management of industrial control systems. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion |
A construction of a self-modifiying language with a formal correction proof. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Yuejiang Wen, Yingjie Lao |
Efficient fuzzy extractor implementations for PUF based authentication. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016 |
MALWARE |
2016 |
DBLP BibTeX RDF |
|
29 | Angel M. Villegas |
Function identification and recovery signature tool. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio |
Message from the general program chair. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Dimitri Vitaliev |
Keynote speaker. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Md. Shahrear Iqbal, Mohammad Zulkernine |
Zonedroid: control your droid through application zoning. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | David Korczynski |
RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio |
Reverse engineering with bioinformatics algorithms over a sound android covert channel. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao |
Dissecting developer policy violating apps: characterization and detection. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | William Casey, Aaron Shelmire |
Signature limits: an entire map of clone features and their discovery in nearly linear time. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Yu Fu 0005, Zhe Jia, Lu Yu 0001, Xingsi Zhong, Richard R. Brooks |
A covert data transport protocol. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Asem Kitana, Issa Traoré, Isaac Woungang |
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Khanh-Huu-The Dam, Tayssir Touili |
Automatic extraction of malicious behaviors. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
29 | |
10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015 |
MALWARE |
2015 |
DBLP BibTeX RDF |
|
29 | Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson |
Using inherent command and control vulnerabilities to halt DDoS attacks. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 |
Measuring the health of antivirus ecosystems. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Raymond Canzanese, Spiros Mancoridis, Moshe Kam |
Run-time classification of malicious processes using system call analysis. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Vern Paxson |
Keynote Speaker. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong |
GroddDroid: a gorilla for triggering malicious behaviors. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | John O'Brien, Kimmo Lehtonen |
Counterfeit mobile devices - the duck test. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Florian Kerber, Dominik Teubert, Ulrike Meyer |
Covert remote syscall communication at kernel level: A SPOOKY backdoor. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy |
Measuring the information security risk in an infrastructure. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Ryan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan |
Targeted DoS on android: how to disable android in 10 seconds or less. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier |
Gorille sniffs code similarities, the case study of qwerty versus regin. |
MALWARE |
2015 |
DBLP DOI BibTeX RDF |
|
29 | |
9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014 |
MALWARE |
2014 |
DBLP BibTeX RDF |
|
29 | Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig |
PsyBoG: Power spectral density analysis for detecting botnet groups. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra |
Agent-based trace learning in a recommendation-verification system for cybersecurity. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn |
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier 0001 |
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio |
Protection against remote code execution exploits of popular applications in Windows. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|