The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
38Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel 0001 Malware analysis with graph kernels and support vector machines. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Li Sun, Tim Ebringer, S. Boztag An automatic anti-anti-VMware technique applicable for multi-stage packed malware. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Ronghua Tian, Lynn Margaret Batten, Steven Versteeg Function length as a tool for malware classification. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion Morphological detection of malware. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Salvatore J. Stolfo, Ke Wang 0009, Wei-Jen Li Towards Stealthy Malware Detection. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Brian Witten, Carey Nachenberg Malware Evolution: A Snapshot of Threats and Countermeasures in 2005. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna Your botnet is my botnet: analysis of a botnet takeover. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF torpig, security, measurement, malware, botnet
35M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information
35Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel mode, Information security, malware, Windows, rootkit
35Jostein Jensen A Novel Testbed for Detection of Malicious Software Functionality. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF testbed, malware, honeypot, behavioural analysis
35Teresa Fernandez, Michael Grinnell, Eric Weakland Poof: no more viruses. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection
35Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
34Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq Using spatio-temporal information in API calls with machine learning algorithms for malware detection. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF api calls, machine learning algorithms, markov chain, malware detection
34M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq On the appropriateness of evolutionary rule learning algorithms for malware detection. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF learning classifier systems, malware detection, genetics based machine learning
34M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq Are evolutionary rule learning algorithms appropriate for malware detection? Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware detection, genetics based machine learning
34Karthik Channakeshava, Deepti Chafekar, Keith R. Bisset, V. S. Anil Kumar 0001, Madhav V. Marathe EpiNet: a simulation framework to study the spread of malware in wireless networks. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF activity-based, wireless epidemics, Bluetooth, malware
34Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Application fingerprinting, traffic deanonymization, machine learning, malware detection
34Youngsang Shin, Steven A. Myers, Minaxi Gupta A Case Study on Asprox Infection Dynamics. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Asprox, Security, Malware, SQL Injection
34Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 BotTracer: Execution-Based Bot-Like Malware Detection. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine, Botnet, malware detection
34Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta Scada Malware, a Proof of Concept. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Malware, Critical infrastructures, SCADA Systems
34Vasileios Karyotis, Symeon Papavassiliou On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack strategies, malware spreading, ad hoc networks
34Hanno Langweg Framework for malware resistance metrics. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, malware, resistance
34Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida Malware phylogeny generation using permutations of code. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF n-perms, evolution, permutation, Malware, worm, n-grams, virus, phylogeny, naming
34Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith Detecting Malicious Code by Model Checking. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model Checking, Malware Detection
31Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
31Hoai-Nam Nguyen, Yoichi Shinoda On Modeling Viral Diffusion in Heterogeneous Wireless Networks . Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
31Bret Michael 0001 Are Governments Up to the Task? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Vikas R. Vasisht, Hsien-Hsin S. Lee SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh A Study of the Packer Problem and Its Solutions. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Eric Filiol, Sébastien Josse A statistical model for undecidable viral detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Jörg Helbach, Jörg Schwenk Secure Internet Voting with Code Sheets. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Fast and Evasive Attacks: Highlighting the Challenges Ahead. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Worms, Network Security, Network Monitoring, Invasive Software
31Mike Bond, George Danezis A pact with the devil. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Weidong Cui, Randy H. Katz, Wai-tian Tan Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Chun Wei, Alan P. Sprague, Gary Warner Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensics, cyber crime
29Yu Adachi, Yoshihiro Oyama Malware analysis system using process-level virtualization. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Hongying Tang, Bo Zhu 0001, Kui Ren 0001 A New Approach to Malware Detection. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Mirco Marchetti, Michele Messori, Michele Colajanni Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Using Formal Grammar and Genetic Operators to Evolve Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Adam J. O'Donnell When Malware Attacks (Anything but Windows). Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Wei Yan, Zheng Zhang, Nirwan Ansari Revealing Packed Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Martin Johns On JavaScript Malware and related threats. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 Automatically Identifying Trigger-based Behavior in Malware. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Rohan Monga, Kamalakar Karlapalem MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation. Search on Bibsonomy MABS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yiran Gu, Yurong Song, Guoping Jiang, Suoping Wang A New Susceptible-Infected Model of Malware Propagation in the Internet. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Weiqing Sun, R. Sekar 0001, Gaurav Poothia, Tejas Karandikar Practical Proactive Integrity Preservation: A Basis for Malware Defense. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Carsten Willems, Thorsten Holz, Felix C. Freiling Toward Automated Dynamic Malware Analysis Using CWSandbox. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Radu State, Olivier Festor Malware: a future framework for device, network and service management. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Andreas Holzer, Johannes Kinder, Helmut Veith Using Verification Technology to Specify and Detect Malware. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan Malware prevalence in the KaZaA file-sharing network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KaZaA, virus prevalence, peer-to-peer
29 13th International Conference on Malicious and Unwanted Software, MALWARE 2018, Nantucket, MA, USA, October 22-24, 2018 Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  BibTeX  RDF
29Julien Piet, Blake Anderson, David A. McGrew An In-Depth Study of Open-Source Command and Control Frameworks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Anthony Skjellum Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian Binary Obfuscation Based Reassemble. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu 0001 SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Asaf Hecht, Adi Sagi, Yuval Elovici PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Bingyin Zhao, Yingjie Lao Resilience of Pruned Neural Network Against Poisoning Attack. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Ramon P. Medina, Elijah B. Neundorfer, Radhouane Chouchane, Alfredo J. Perez PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017 Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  BibTeX  RDF
29Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Lu Yu 0001, Qing Wang 0047, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang TARN: A SDN-based traffic analysis resistant network architecture. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively Rootkit detection through phase-space analysis of power voltage measurements. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Kurt Baumgartner "Attribution: The art and practice of answering the ancient question surrounding a crime - Who DID it?". Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon A virtual testbed for security management of industrial control systems. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion A construction of a self-modifiying language with a formal correction proof. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Yuejiang Wen, Yingjie Lao Efficient fuzzy extractor implementations for PUF based authentication. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016 Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  BibTeX  RDF
29Angel M. Villegas Function identification and recovery signature tool. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Fernando C. Colón Osorio Message from the general program chair. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Dimitri Vitaliev Keynote speaker. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Md. Shahrear Iqbal, Mohammad Zulkernine Zonedroid: control your droid through application zoning. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29David Korczynski RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Sergio Ivan Vargas Razo, Eleazar Aguirre Anaya, Ponciano Jorge Escamilla-Ambrosio Reverse engineering with bioinformatics algorithms over a sound android covert channel. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao Dissecting developer policy violating apps: characterization and detection. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29William Casey, Aaron Shelmire Signature limits: an entire map of clone features and their discovery in nearly linear time. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Yu Fu 0005, Zhe Jia, Lu Yu 0001, Xingsi Zhong, Richard R. Brooks A covert data transport protocol. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Asem Kitana, Issa Traoré, Isaac Woungang Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Khanh-Huu-The Dam, Tayssir Touili Automatic extraction of malicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015 Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  BibTeX  RDF
29Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson Using inherent command and control vulnerabilities to halt DDoS attacks. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez 0001 Measuring the health of antivirus ecosystems. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Raymond Canzanese, Spiros Mancoridis, Moshe Kam Run-time classification of malicious processes using system call analysis. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Vern Paxson Keynote Speaker. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong GroddDroid: a gorilla for triggering malicious behaviors. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29John O'Brien, Kimmo Lehtonen Counterfeit mobile devices - the duck test. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Florian Kerber, Dominik Teubert, Ulrike Meyer Covert remote syscall communication at kernel level: A SPOOKY backdoor. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Ferenc Leitold, Kalman Hadarics, Eszter Oroszi, Krisztina Gyorffy Measuring the information security risk in an infrastructure. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Ryan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan Targeted DoS on android: how to disable android in 10 seconds or less. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier Gorille sniffs code similarities, the case study of qwerty versus regin. Search on Bibsonomy MALWARE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014 Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  BibTeX  RDF
29Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig PsyBoG: Power spectral density analysis for detecting botnet groups. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra Agent-based trace learning in a recommendation-verification system for cybersecurity. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Jihwan Jeong, Dongwon Seo, Chanyoung Lee, Jonghoon Kwon, Heejo Lee, John Milburn MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier 0001 Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio Protection against remote code execution exploits of popular applications in Windows. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license