|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan |
BoTGen: A new approach for in-lab generation of botnet datasets. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson |
Fighting banking botnets by exploiting inherent command and control vulnerabilities. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici |
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao |
Automatic construction of printable return-oriented programming payload. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio |
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio |
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jan Gassen, Jonathan P. Chapman |
HoneyAgent: Detecting malicious Java applets by using dynamic analysis. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | |
8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013 |
MALWARE |
2013 |
DBLP BibTeX RDF |
|
29 | Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos |
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Analysis and diversion of Duqu's driver. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Joshua S. White, Jeanna N. Matthews |
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith |
Circumventing keyloggers and screendumps. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio, Ferenc Leitold, Dorottya Mike, Chris Pickard, Sveta Miladinov, Anthony Arrott |
Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jason Upchurch, Xiaobo Zhou 0002 |
First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee |
Dynamic classification of packing algorithms for inspecting executables using entropy analysis. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jeffrey Wu 0002, Anthony Arrott |
Use-case-specific metrics for comparative testing of endpoint security products. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Mykola Protsenko, Tilo Müller |
PANDORA applies non-deterministic obfuscation randomly to Android. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla |
REcompile: A decompilation framework for static analysis of binaries. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | |
7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012 |
MALWARE |
2012 |
DBLP BibTeX RDF |
|
29 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Code synchronization by morphological analysis. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Markus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak |
A trusted ecosystem for Android applications based on context-aware access control. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Areej Al-Bataineh, Gregory White 0001 |
Analysis and detection of malicious data exfiltration in web traffic. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Zhibo Zhao, Fernando C. Colón Osorio |
"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Chris Pickard, Sveta Miladinov |
Rogue software: Protection against potentially unwanted applications. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Wesley Jin, Charles Hines, Cory F. Cohen, Priya Narasimhan |
A scalable search index for binary files. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Marx 0004, Alice Decker, Anthony Arrott |
Component protection metrics for security product development: I. AV-TEST Full Product Tests. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold, Kalman Hadarics |
Measuring security risk in the cloud-enabled enterprise. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Wei Xu, Fangfang Zhang 0005, Sencun Zhu |
The power of obfuscation techniques in malicious JavaScript code: A measurement study. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Brian Hay, Kara L. Nance |
Circumventing cryptography in virtualized environments. |
MALWARE |
2012 |
DBLP DOI BibTeX RDF |
|
29 | |
6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011 |
MALWARE |
2011 |
DBLP BibTeX RDF |
|
29 | Mark Balanza, Kervin Alintanahin, Oscar Abendan, Julius Dizon, Bernadette Caraig |
DroidDreamLight lurks behind legitimate Android apps. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Leonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak |
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Vikram Phatak, Rick Moy |
Evaluating security products based on appropriate usage. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Michalis Polychronakis, Angelos D. Keromytis |
ROP payload detection using speculative code execution. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold |
Testing protections against web threats. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Hoon You, Bong-Nam Noh |
Android platform based linux kernel rootkit. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui |
A recoverable hybrid C&C botnet. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Hugo Gonzalez-Robledo, Kara Nance, Jose Nazario |
Phishing by form: The abuse of form sites. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez |
Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Matt Bishop, Richard Ford, Marco Ramilli |
Results-oriented security. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
29 | |
5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010 |
MALWARE |
2010 |
DBLP BibTeX RDF |
|
29 | Isabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka |
Unconditional self-modifying code elimination with dynamic compiler optimizations. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Collin Mulliner, Jean-Pierre Seifert |
Rise of the iBots: Owning a telco network. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio, Frank S. Posluszny |
Overcoming the limitations in computer worm models. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak |
An Android Application Sandbox system for suspicious software detection. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte |
Exploiting an I/OMMU vulnerability. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee |
Generic unpacking using entropy analysis. |
MALWARE |
2010 |
DBLP DOI BibTeX RDF |
|
29 | |
4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009 |
MALWARE |
2009 |
DBLP BibTeX RDF |
|
29 | Wadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey |
Server-side dynamic code analysis. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peter Likarish, Eunjin Jung, Insoon Jo |
Obfuscated malicious javascript detection using classification techniques. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu |
Analyzing DNS activities of bot processes. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang |
The waledac protocol: The how and why. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam 0001, Steven Versteeg |
An automated classification system based on the strings of trojan and virus families. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Carlton R. Davis, José M. Fernandez 0001, Stephen Neville |
Optimising sybil attacks against P2P-based botnets. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini |
Nebula - generating syntactical network intrusion signatures. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | |
3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008 |
MALWARE |
2008 |
DBLP BibTeX RDF |
|
29 | Vinoo Thomas, Nitin Jyoti |
Combating file infectors on corporate networks. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jamie Levy, Jaroslaw Paduch, Bilal Khan |
Superimposing permutational covert channels onto reliable stream protocols. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock |
Image spam - ASCII to the rescue! |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Carlton R. Davis, José M. Fernandez 0001, Stephen Neville, John McHugh |
Sybil attacks as a mitigation strategy against the Storm botnet. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jose Nazario, Thorsten Holz |
As the net churns: Fast-flux botnet observations. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sushant Sinha, Michael D. Bailey, Farnam Jahanian |
Shades of grey: On the effectiveness of reputation-based "blacklists". |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Dittrich, Sven Dietrich |
P2P as botnet command and control: A deeper insight. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia |
Using Markov chains to filter machine-morphed variants of malicious programs. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio |
State of wireless security implementations in the United States and Europe - empirical data. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Harley, Pierre-Marc Bureau |
Drive-by downloads from the trenches. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Cristian Craioveanu |
Server-side script polumorphism: Techniques of analysis and defense. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mihai Christodorescu, Shai Rubin |
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Paul Barford, Vinod Yegneswaran |
An Inside Look at Botnets. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | William G. J. Halfond, Alessandro Orso |
Detection and Prevention of SQL Injection Attacks. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Nicholas Weaver, Stuart Staniford, Vern Paxson |
Very Fast Containment of Scanning Worms, Revisited. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Stelios Sidiroglou, Angelos D. Keromytis |
Composite Hybrid Techniques For Defending Against Targeted Attacks. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Christopher Kruegel |
Behavioral and Structural Properties of Malicious Code. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | David Brumley, James Newsome, Dawn Song |
Sting: An End-to-End Self-Healing System for Defending against Internet Worms. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Geoffrey Smith 0001 |
Principles of Secure Information Flow Analysis. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Giovanni Vigna |
Static Disassembly and Code Analysis. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum |
A Next-Generation Platform for Analyzing Executables. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall |
Assessment of Virtualization as a Sensor Technique. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
virtualization detection, virtual machine, virtualization, malware, honeypot, cyber-security, malware analysis |
29 | David de Drézigué, Jean-Paul Fizaine, Nils Hansma |
In-depth analysis of the viral threats with OpenOffice.org documents. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Macro virus, Document malware, Self-reproduction, Antiviral Policy, Security Policy, Malware |
27 | Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 |
Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification. |
IEEE Trans. Computers |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas |
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas |
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. |
ISI |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 |
Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Yoshihiro Oyama |
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. |
DIMVA |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. |
Comput. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim |
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. |
Digit. Investig. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo |
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. |
Int. J. Wirel. Networks Broadband Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
25 | Brad Smith |
A Storm (Worm) Is Brewing. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
Storm worm, security, malware |
25 | Linda Dailey Paulson |
News Briefs. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
airgap technology, eye-tracking technology, malware, Wi-Fi |
25 | Thomas Panas |
Signature visualization of software binaries. |
SOFTVIS |
2008 |
DBLP DOI BibTeX RDF |
malware visualization, binary analysis |
25 | Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian |
Virtualized in-cloud security services for mobile devices. |
MobiVirt |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, malware detection, antivirus |
25 | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell |
A Layered Architecture for Detecting Malicious Behaviors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Dynamic, Malware, Behavior, Data-Flow, Semantic Gap |
25 | Greg Goth |
Fast-Moving Zombies: Botnets Stay a Step Ahead of the Fixes. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
zombies, malware, botnets |
25 | Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, Fang Fang 0001 |
Reengineering the Internet for Better Security. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
Service provider certification, Game theoretic analysis, Security, Internet, Malware |
25 | Eric Filiol |
Formalisation and implementation aspects of K -ary (malicious) codes. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism |
25 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
25 | Linda Dailey Paulson |
News Briefs. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors |
25 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Auditable Privacy: On Tamper-Evident Mix Networks. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
tamper-evident, observer, malware, covert channel, Mix network, subliminal channel |
Displaying result #301 - #400 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|