|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Muhammad H. ElSheikh, Mohammed S. Gadelrab, Mahmoud A. Ghoneim, Mohsen A. Rashwan |
BoTGen: A new approach for in-lab generation of botnet datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 76-84, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson |
Fighting banking botnets by exploiting inherent command and control vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 93-100, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici |
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 58-67, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Wenbiao Ding, Xiao Xing, Ping Chen 0003, Zhi Xin, Bing Mao |
Automatic construction of printable return-oriented programming payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 18-25, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold, Anthony Arrott, Fernando C. Colón Osorio |
Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 40-49, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Clementi, Peter Stelzhammer, Fernando C. Colón Osorio |
Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 35-42, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jan Gassen, Jonathan P. Chapman |
HoneyAgent: Detecting malicious Java applets by using dynamic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, Fajardo, PR, USA, October 28-30, 2014, pp. 109-117, 2014, IEEE Computer Society, 978-1-4799-7328-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | |
8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4799-2534-6 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
29 | Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos |
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 116-123, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Analysis and diversion of Duqu's driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 109-115, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Joshua S. White, Jeanna N. Matthews |
It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 51-58, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith |
Circumventing keyloggers and screendumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 103-108, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio, Ferenc Leitold, Dorottya Mike, Chris Pickard, Sveta Miladinov, Anthony Arrott |
Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 27-34, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jason Upchurch, Xiaobo Zhou 0002 |
First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 68-76, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Munkhbayar Bat-Erdene, Taebeom Kim, Hongzhe Li, Heejo Lee |
Dynamic classification of packing algorithms for inspecting executables using entropy analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 19-26, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jeffrey Wu 0002, Anthony Arrott |
Use-case-specific metrics for comparative testing of endpoint security products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 35-40, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Mykola Protsenko, Tilo Müller |
PANDORA applies non-deterministic obfuscation randomly to Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 59-67, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla |
REcompile: A decompilation framework for static analysis of binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 95-102, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | |
7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4673-4880-5 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
29 | Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry |
Code synchronization by morphological analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 112-119, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Markus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak |
A trusted ecosystem for Android applications based on context-aware access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 73-78, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Areej Al-Bataineh, Gregory White 0001 |
Analysis and detection of malicious data exfiltration in web traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 26-31, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Zhibo Zhao, Fernando C. Colón Osorio |
"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 135-143, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Chris Pickard, Sveta Miladinov |
Rogue software: Protection against potentially unwanted applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 1-8, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Wesley Jin, Charles Hines, Cory F. Cohen, Priya Narasimhan |
A scalable search index for binary files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 94-103, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Marx 0004, Alice Decker, Anthony Arrott |
Component protection metrics for security product development: I. AV-TEST Full Product Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 54-61, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold, Kalman Hadarics |
Measuring security risk in the cloud-enabled enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 62-66, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Wei Xu, Fangfang Zhang 0005, Sencun Zhu |
The power of obfuscation techniques in malicious JavaScript code: A measurement study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 9-16, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Brian Hay, Kara L. Nance |
Circumventing cryptography in virtualized environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 7th International Conference on Malicious and Unwanted Software, MALWARE 2012, Fajardo, PR, USA, October 16-18, 2012, pp. 32-38, 2012, IEEE Computer Society, 978-1-4673-4880-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | |
6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4673-0033-9 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
29 | Mark Balanza, Kervin Alintanahin, Oscar Abendan, Julius Dizon, Bernadette Caraig |
DroidDreamLight lurks behind legitimate Android apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 73-78, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Leonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak |
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 66-72, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Vikram Phatak, Rick Moy |
Evaluating security products based on appropriate usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 27-33, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Michalis Polychronakis, Angelos D. Keromytis |
ROP payload detection using speculative code execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 58-65, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Ferenc Leitold |
Testing protections against web threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 20-26, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Hoon You, Bong-Nam Noh |
Android platform based linux kernel rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 79-87, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui |
A recoverable hybrid C&C botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 110-118, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Hugo Gonzalez-Robledo, Kara Nance, Jose Nazario |
Phishing by form: The abuse of form sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 95-101, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez |
Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 88-94, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Matt Bishop, Richard Ford, Marco Ramilli |
Results-oriented security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 42-49, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | |
5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4244-9355-5 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
29 | Isabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka |
Unconditional self-modifying code elimination with dynamic compiler optimizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 47-54, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Collin Mulliner, Jean-Pierre Seifert |
Rise of the iBots: Owning a telco network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 71-80, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio, Frank S. Posluszny |
Overcoming the limitations in computer worm models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 81-90, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak |
An Android Application Sandbox system for suspicious software detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 55-62, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte |
Exploiting an I/OMMU vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 7-14, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee |
Generic unpacking using entropy analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010, pp. 98-105, 2010, IEEE Computer Society, 978-1-4244-9355-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | |
4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4244-5787-8 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
29 | Wadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey |
Server-side dynamic code analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 55-62, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peter Likarish, Eunjin Jung, Insoon Jo |
Obfuscated malicious javascript detection using classification techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 47-54, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu |
Analyzing DNS activities of bot processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 98-103, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang |
The waledac protocol: The how and why. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 69-77, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam 0001, Steven Versteeg |
An automated classification system based on the strings of trojan and virus families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 23-30, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Carlton R. Davis, José M. Fernandez 0001, Stephen Neville |
Optimising sybil attacks against P2P-based botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 78-87, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini |
Nebula - generating syntactical network intrusion signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009, pp. 31-38, 2009, IEEE Computer Society, 978-1-4244-5787-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | |
3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![IEEE Computer Society, 978-1-4244-3288-2 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
29 | Vinoo Thomas, Nitin Jyoti |
Combating file infectors on corporate networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 85-91, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jamie Levy, Jaroslaw Paduch, Bilal Khan |
Superimposing permutational covert channels onto reliable stream protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 49-56, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock |
Image spam - ASCII to the rescue! ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 65-68, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Carlton R. Davis, José M. Fernandez 0001, Stephen Neville, John McHugh |
Sybil attacks as a mitigation strategy against the Storm botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 32-40, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jose Nazario, Thorsten Holz |
As the net churns: Fast-flux botnet observations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 24-31, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sushant Sinha, Michael D. Bailey, Farnam Jahanian |
Shades of grey: On the effectiveness of reputation-based "blacklists". ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 57-64, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Dittrich, Sven Dietrich |
P2P as botnet command and control: A deeper insight. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 41-48, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia |
Using Markov chains to filter machine-morphed variants of malicious programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 77-84, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Fernando C. Colón Osorio |
State of wireless security implementations in the United States and Europe - empirical data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 92-97, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Harley, Pierre-Marc Bureau |
Drive-by downloads from the trenches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 98-103, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Cristian Craioveanu |
Server-side script polumorphism: Techniques of analysis and defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 9-16, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mihai Christodorescu, Shai Rubin |
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 193-209, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Paul Barford, Vinod Yegneswaran |
An Inside Look at Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 171-191, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | William G. J. Halfond, Alessandro Orso |
Detection and Prevention of SQL Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 85-109, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Nicholas Weaver, Stuart Staniford, Vern Paxson |
Very Fast Containment of Scanning Worms, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 113-145, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Stelios Sidiroglou, Angelos D. Keromytis |
Composite Hybrid Techniques For Defending Against Targeted Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 213-229, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 253-289, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Christopher Kruegel |
Behavioral and Structural Properties of Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 63-83, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | David Brumley, James Newsome, Dawn Song |
Sting: An End-to-End Self-Healing System for Defending against Internet Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 147-170, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Geoffrey Smith 0001 |
Principles of Secure Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 291-307, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Giovanni Vigna |
Static Disassembly and Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 19-41, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum |
A Next-Generation Platform for Analyzing Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Malware Detection ![In: Malware Detection, pp. 43-61, 2007, Springer, 978-0-387-32720-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall |
Assessment of Virtualization as a Sensor Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, Oakland, CA, USA, May 20, 2010, pp. 61-65, 2010, IEEE Computer Society, 978-0-7695-4052-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
virtualization detection, virtual machine, virtualization, malware, honeypot, cyber-security, malware analysis |
29 | David de Drézigué, Jean-Paul Fizaine, Nils Hansma |
In-depth analysis of the viral threats with OpenOffice.org documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(3), pp. 187-210, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Macro virus, Document malware, Self-reproduction, Antiviral Policy, Security Policy, Malware |
27 | Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 |
Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 72(2), pp. 438-451, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas |
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.01350, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas |
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2023, Charlotte, NC, USA, October 2-3, 2023, pp. 1-3, 2023, IEEE, 979-8-3503-3773-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Fangtian Zhong, Zekai Chen, Minghui Xu 0001, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng 0001 |
Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.04314, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Yoshihiro Oyama |
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp. 197-218, 2019, Springer, 978-3-030-22037-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 58, pp. 125-138, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim |
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 14, pp. 17-35, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo |
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Networks Broadband Technol. ![In: Int. J. Wirel. Networks Broadband Technol. 2(3), pp. 52-60, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 50-61, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
25 | Brad Smith |
A Storm (Worm) Is Brewing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(2), pp. 20-22, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Storm worm, security, malware |
25 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(7), pp. 17-19, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
airgap technology, eye-tracking technology, malware, Wi-Fi |
25 | Thomas Panas |
Signature visualization of software binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFTVIS ![In: Proceedings of the ACM 2008 Symposium on Software Visualization, Ammersee, Germany, September 16-17, 2008, pp. 185-188, 2008, ACM, 978-1-60558-112-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malware visualization, binary analysis |
25 | Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian |
Virtualized in-cloud security services for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiVirt ![In: Proceedings of the First Workshop on Virtualization in Mobile Computing, Breckenridge, CO, USA, June 17, 2008, pp. 31-35, 2008, ACM, 978-1-60558-328-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, malware detection, antivirus |
25 | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell |
A Layered Architecture for Detecting Malicious Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 78-97, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dynamic, Malware, Behavior, Data-Flow, Semantic Gap |
25 | Greg Goth |
Fast-Moving Zombies: Botnets Stay a Step Ahead of the Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(2), pp. 7-9, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
zombies, malware, botnets |
25 | Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, Fang Fang 0001 |
Reengineering the Internet for Better Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(1), pp. 40-44, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Service provider certification, Game theoretic analysis, Security, Internet, Malware |
25 | Eric Filiol |
Formalisation and implementation aspects of K -ary (malicious) codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 75-86, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism |
25 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 219-235, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
25 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(4), pp. 17-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors |
25 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Auditable Privacy: On Tamper-Evident Mix Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 126-141, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tamper-evident, observer, malware, covert channel, Mix network, subliminal channel |
Displaying result #301 - #400 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|