The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan BoTGen: A new approach for in-lab generation of botnet datasets. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson Fighting banking botnets by exploiting inherent command and control vulnerabilities. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao Automatic construction of printable return-oriented programming payload. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Jan Gassen, Jonathan P. Chapman HoneyAgent: Detecting malicious Java applets by using dynamic analysis. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013 Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  BibTeX  RDF
29Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry Analysis and diversion of Duqu's driver. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Joshua S. White, Jeanna N. Matthews It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith Circumventing keyloggers and screendumps. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Fernando C. Colón Osorio, Ferenc Leitold, Dorottya Mike, Chris Pickard, Sveta Miladinov, Anthony Arrott Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Jason Upchurch, Xiaobo Zhou 0002 First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee Dynamic classification of packing algorithms for inspecting executables using entropy analysis. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Jeffrey Wu 0002, Anthony Arrott Use-case-specific metrics for comparative testing of endpoint security products. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Mykola Protsenko, Tilo Müller PANDORA applies non-deterministic obfuscation randomly to Android. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla REcompile: A decompilation framework for static analysis of binaries. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012 Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  BibTeX  RDF
29Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry Code synchronization by morphological analysis. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Markus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak A trusted ecosystem for Android applications based on context-aware access control. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Areej Al-Bataineh, Gregory White 0001 Analysis and detection of malicious data exfiltration in web traffic. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Zhibo Zhao, Fernando C. Colón Osorio "TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Chris Pickard, Sveta Miladinov Rogue software: Protection against potentially unwanted applications. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Wesley Jin, Charles Hines, Cory F. Cohen, Priya Narasimhan A scalable search index for binary files. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Andreas Marx 0004, Alice Decker, Anthony Arrott Component protection metrics for security product development: I. AV-TEST Full Product Tests. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Ferenc Leitold, Kalman Hadarics Measuring security risk in the cloud-enabled enterprise. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Wei Xu, Fangfang Zhang 0005, Sencun Zhu The power of obfuscation techniques in malicious JavaScript code: A measurement study. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Brian Hay, Kara L. Nance Circumventing cryptography in virtualized environments. Search on Bibsonomy MALWARE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011 Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  BibTeX  RDF
29Mark Balanza, Kervin Alintanahin, Oscar Abendan, Julius Dizon, Bernadette Caraig DroidDreamLight lurks behind legitimate Android apps. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Leonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Vikram Phatak, Rick Moy Evaluating security products based on appropriate usage. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Michalis Polychronakis, Angelos D. Keromytis ROP payload detection using speculative code execution. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Ferenc Leitold Testing protections against web threats. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Dong-Hoon You, Bong-Nam Noh Android platform based linux kernel rootkit. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui A recoverable hybrid C&C botnet. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Hugo Gonzalez-Robledo, Kara Nance, Jose Nazario Phishing by form: The abuse of form sites. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Matt Bishop, Richard Ford, Marco Ramilli Results-oriented security. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010 Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  BibTeX  RDF
29Isabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka Unconditional self-modifying code elimination with dynamic compiler optimizations. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Collin Mulliner, Jean-Pierre Seifert Rise of the iBots: Owning a telco network. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Fernando C. Colón Osorio, Frank S. Posluszny Overcoming the limitations in computer worm models. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak An Android Application Sandbox system for suspicious software detection. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte Exploiting an I/OMMU vulnerability. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee Generic unpacking using entropy analysis. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009 Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  BibTeX  RDF
29Wadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey Server-side dynamic code analysis. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Peter Likarish, Eunjin Jung, Insoon Jo Obfuscated malicious javascript detection using classification techniques. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu Analyzing DNS activities of bot processes. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang The waledac protocol: The how and why. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam 0001, Steven Versteeg An automated classification system based on the strings of trojan and virus families. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Carlton R. Davis, José M. Fernandez 0001, Stephen Neville Optimising sybil attacks against P2P-based botnets. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini Nebula - generating syntactical network intrusion signatures. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008 Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  BibTeX  RDF
29Vinoo Thomas, Nitin Jyoti Combating file infectors on corporate networks. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jamie Levy, Jaroslaw Paduch, Bilal Khan Superimposing permutational covert channels onto reliable stream protocols. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock Image spam - ASCII to the rescue! Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Carlton R. Davis, José M. Fernandez 0001, Stephen Neville, John McHugh Sybil attacks as a mitigation strategy against the Storm botnet. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jose Nazario, Thorsten Holz As the net churns: Fast-flux botnet observations. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Sushant Sinha, Michael D. Bailey, Farnam Jahanian Shades of grey: On the effectiveness of reputation-based "blacklists". Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29David Dittrich, Sven Dietrich P2P as botnet command and control: A deeper insight. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia Using Markov chains to filter machine-morphed variants of malicious programs. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Fernando C. Colón Osorio State of wireless security implementations in the United States and Europe - empirical data. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29David Harley, Pierre-Marc Bureau Drive-by downloads from the trenches. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Cristian Craioveanu Server-side script polumorphism: Techniques of analysis and defense. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Mihai Christodorescu, Shai Rubin Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Paul Barford, Vinod Yegneswaran An Inside Look at Botnets. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29William G. J. Halfond, Alessandro Orso Detection and Prevention of SQL Injection Attacks. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Nicholas Weaver, Stuart Staniford, Vern Paxson Very Fast Containment of Scanning Worms, Revisited. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Stelios Sidiroglou, Angelos D. Keromytis Composite Hybrid Techniques For Defending Against Targeted Attacks. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Christopher Kruegel Behavioral and Structural Properties of Malicious Code. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29David Brumley, James Newsome, Dawn Song Sting: An End-to-End Self-Healing System for Defending against Internet Worms. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Geoffrey Smith 0001 Principles of Secure Information Flow Analysis. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Giovanni Vigna Static Disassembly and Code Analysis. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum A Next-Generation Platform for Analyzing Executables. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall Assessment of Virtualization as a Sensor Technique. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF virtualization detection, virtual machine, virtualization, malware, honeypot, cyber-security, malware analysis
29David de Drézigué, Jean-Paul Fizaine, Nils Hansma In-depth analysis of the viral threats with OpenOffice.org documents. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Macro virus, Document malware, Self-reproduction, Antiviral Policy, Security Policy, Malware
27Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. Search on Bibsonomy ISI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Yoshihiro Oyama How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Search on Bibsonomy Digit. Investig. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. Search on Bibsonomy Int. J. Wirel. Networks Broadband Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Aniello Castiglione, Roberto De Prisco, Alfredo De Santis Do You Trust Your Phone? Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security
25Brad Smith A Storm (Worm) Is Brewing. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Storm worm, security, malware
25Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF airgap technology, eye-tracking technology, malware, Wi-Fi
25Thomas Panas Signature visualization of software binaries. Search on Bibsonomy SOFTVIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware visualization, binary analysis
25Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Virtualized in-cloud security services for mobile devices. Search on Bibsonomy MobiVirt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile devices, malware detection, antivirus
25Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell A Layered Architecture for Detecting Malicious Behaviors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic, Malware, Behavior, Data-Flow, Semantic Gap
25Greg Goth Fast-Moving Zombies: Botnets Stay a Step Ahead of the Fixes. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zombies, malware, botnets
25Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, Fang Fang 0001 Reengineering the Internet for Better Security. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Service provider certification, Game theoretic analysis, Security, Internet, Malware
25Eric Filiol Formalisation and implementation aspects of K -ary (malicious) codes. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism
25Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
25Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors
25Jong Youl Choi, Philippe Golle, Markus Jakobsson Auditable Privacy: On Tamper-Evident Mix Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tamper-evident, observer, malware, covert channel, Mix network, subliminal channel
Displaying result #301 - #400 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license