|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
25 | Michael Blanco, Kay White |
Reactive to proactive support: a corn dance. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
cross-training, support desk, work-study, security, performance, project management, malware, virus, staffing |
25 | Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong |
ExecRecorder: VM-based full-system replay for attack analysis and system recovery. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, recovery, malware, worms, replay, invasive software |
25 | Neal Leavitt |
Mobile Phones: The Next Frontier for Hackers? |
Computer |
2005 |
DBLP DOI BibTeX RDF |
malware, cell phones, wireless security, viruses |
25 | John Aycock, Ken Barker 0001 |
Viruses 101. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
anti-virus software, university course, malware, computer viruses |
25 | Anil Somayaji |
How to Win and Evolutionary Arms Race. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
virus protection, malware, secure systems |
25 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
23 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin |
Obfuscation: The Hidden Malware. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
packer, metamorphism, computer security, polymorphism, malware, obfuscation |
23 | Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao |
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
darknet, spam, malware, honeypot, botnet, correlation analysis |
23 | Brijesh Kumar, Constantine Katsinis |
A Network Based Approach to Malware Detection in Large IT Infrastructures. |
NCA |
2010 |
DBLP DOI BibTeX RDF |
host security, distributed virus detection, malware detection, Infrastructure security |
23 | Dmitriy Komashinskiy, Igor V. Kotenko |
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. |
PDP |
2010 |
DBLP DOI BibTeX RDF |
positionally dependent features, static and dynamic detection, classification, feature selection, malware |
23 | Klaus Hildebrandt, Igor Podebrad, Bernd Klauer |
A Computer Architecture with Hardwarebased Malware Detection. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
secure computer architecture, hardware based security, multicore, malware |
23 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Formalization of Viruses and Malware Through Process Algebras. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
process algebra, detection, malware, prevention |
23 | Asaf Shabtai |
Malware Detection on Mobile Devices. |
Mobile Data Management |
2010 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Mobile Devices, Malware, Android, SELinux |
23 | Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto |
Vulnerability in Public Malware Sandbox Analysis Systems. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
Malware sandbox analysis, Sandbox detection |
23 | Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan |
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Probabilistic Optimization, Specification, Malware, Software Security |
23 | Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero |
Identifying Dormant Functionality in Malware Programs. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
dormant functionality, binary analysis, malware analysis |
23 | Silvio Cesare, Yang Xiang 0001 |
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
unpacking, Network security, emulation, malware, structural classification |
23 | Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou |
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
malware spreading, topology control attacks, closed queuing networks |
23 | Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu |
Static Analysis of Malware to Detect Exception Return. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
Malware, Obfuscation, Disassemble |
23 | Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
T-PIM: Trusted Password Input Method against Data Stealing Malware. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Data Stealing Malware, Virus, Hypervisor, Spyware |
23 | Roland Gabriel, Tobias Hoppe, Alexander Pastwa, Sebastian Sowa |
Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results. |
DBKDA |
2009 |
DBLP DOI BibTeX RDF |
Log Data, Security Information and Event Management, Data Mining, Cluster Analysis, Malware, Information Security Management, Association Analysis |
23 | Liang Xie 0002, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu |
Designing System-Level Defenses against Cellphone Malware. |
SRDS |
2009 |
DBLP DOI BibTeX RDF |
authentication, access control, Malware, Turing test |
23 | Yu Zhang, Bharat K. Bhargava, Philipp Hurni |
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation. |
SRDS |
2009 |
DBLP DOI BibTeX RDF |
Collaboration, Network Security, Thread, Malware, Propagation |
23 | Fernando C. Colón Osorio, Zachi Klopman |
An initial analysis and presentation of malware exhibiting swarm-like behavior. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
swarm worms, swarm intelligence, malware, emergent behavior, internet worms |
23 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
20 | M. H. R. Khouzani, Saswati Sarkar, Eitan Altman |
Optimal propagation of security patches in mobile wireless networks: extended abstract. |
SIGMETRICS |
2010 |
DBLP DOI BibTeX RDF |
dynamic patching, security-performance trade-off, optimal control |
20 | Pradip De, Yonghe Liu, Sajal K. Das 0001 |
An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Márk Jelasity, Vilmos Bilicki |
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Fabian Hugelshofer, Paul Smith 0001, David Hutchison 0001, Nicholas J. P. Race |
OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. |
MobiCom |
2009 |
DBLP DOI BibTeX RDF |
performance, intrusion detection, wireless mesh network, resource constrained devices |
20 | Asaf Shabtai, Uri Kanonov, Yuval Elovici |
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
KBTA, Host-Based Intrusion Detection Systems, Mobile Devices |
20 | Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
ALICE@home: Distributed Framework for Detecting Malicious Sites. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Andrew Brown 0005, Mark Ryan 0001 |
Context-Aware Monitoring of Untrusted Mobile Applications. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Steve Webb, James Caverlee, Calton Pu |
Predicting web spam with HTTP session information. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
HTTP session information, classification, web spam |
20 | Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan |
A hypervisor-based system for protecting software runtime memory and persistent storage. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor |
20 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu |
Formal Abstraction of Semantics for Detecting Malicious Code. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Philippe Beaucamps, Eric Filiol |
On the possibility of practically obfuscating programs towards a unified perspective of code protection. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Luke Bellamy, Damien Hutchinson, Jason Wells |
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Peter C. S. Kwan, Glenn Durfee |
Practical Uses of Virtual Machines for Protection of Sensitive User Data. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Napoleon Paxton, Gail-Joon Ahn, Bill Chu |
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
20 | Frank H. Katz |
Campus-wide spyware and virus removal as a method of teaching information security. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security awareness programs, design, information security, information security education |
20 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
20 | Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala |
Polymorphic Malicious Executable Scanner by API Sequence Analysis. |
HIS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
A Framework for Behavior-Based Malware Analysis in the Cloud. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Evolvable malware. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
genetic algorithm, computer virus, artificial evolution |
19 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
19 | Zhiqiang Lin, Ryan D. Riley, Dongyan Xu |
Polymorphing Software by Randomizing Data Structure Layout. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou |
Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
infection efficiency, wireless ad hoc networks, closed queuing networks |
19 | George Lawton |
Is It Finally Time to Worry about Mobile Malware? |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Grégoire Jacob, Hervé Debar, Eric Filiol |
Behavioral detection of malware: from a survey towards an established taxonomy. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
19 | Luca Carettoni, Claudio Merloni, Stefano Zanero |
Studying Bluetooth Malware Propagation: The BlueBag Project. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Urs E. Gattiker |
Bologna process revisited: educating information security and malware experts. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Pattarasinee Bhattarakosol, Vasin Suttichaya |
Multiple Equivalent Scale Scan: An Enhancing Technique for Malware Detection. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Lifu Wang, Partha Dasgupta |
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis |
A Study of Malcode-Bearing Documents. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Sandbox Diversity, Intrusion Detection, N-gram |
19 | Mohamed R. Chouchane, Arun Lakhotia |
Using engine signature to detect metamorphic malware. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
metamorphic engine, virus scanner |
19 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Roger Karrer |
EC: an edge-based architecture against DDoS attacks and malware spread. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Michael G. Bailey |
Malware resistant networking using system diversity. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
monoculture, network, diversity, survivability, epidemic |
19 | Hal Berghel |
Malware month. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin |
A hybrid malware analysis approach for identifying process-injection malware based on machine learning. |
Int. J. Secur. Networks |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Dong-Ok Won, Yong-Nam Jang, Seong-Whan Lee |
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection. |
IEEE Trans. Emerg. Top. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Furqan Rustam, Imran Ashraf, Anca Delia Jurcut, Ali Kashif Bashir, Yousaf Bin Zikria |
Malware detection using image representation of malware data and transfer learning. |
J. Parallel Distributed Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ahmed Sabbah, Mohammed Kharma, Mustafa Jarrar |
Creating Android Malware Knowledge Graph Based on a Malware Ontology. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Younghoon Ban, Jeong Hyun Yi, Haehyun Cho |
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification. |
Comput. Syst. Sci. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto |
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sanyam Jain, Sumaiya Thaseen |
Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware Categories. |
ICCST |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tejpal Sharma, Dhavleesh Rattan, Parneet Kaur, Anuj Kumar Gupta, Jagbir Singh Gill |
Enhancing Android Malware Detection: CFS Based Texture Feature Selection and Ensembled Classifier for Malware App Analysis. |
RTIP2R (2) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hemant Rathore, Praneeth B, Sundaraja Sitharama Iyengar, Sanjay K. Sahay |
Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. |
ICCS (5) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth 0001 |
Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection. |
DIMVA |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham |
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification. |
J. Inf. Secur. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Manoj D. Shelar, S. Srinivasa Rao 0004 |
Deep malware hunter based unrivaled malware detection schema thru cache retrospective empiricism. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Niusen Chen, Bo Chen 0028 |
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration. |
J. Cybersecur. Priv. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Sebastian Grochola, Andrew Milliner |
A comparison, analysis, and provision of methods in identifying types of malware and means of malware detection and protection against them. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mauro Conti, Shubham Khandhar, Vinod P. 0001 |
A few-shot malware classification approach for unknown family recognition using malware feature visualization. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Rajesh Kumar, Geetha Subbiah |
Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
18 | David Arnold 0006, Charlotte David, Jafar Saniie |
PowerShell Malware Analysis Using a Novel Malware Rating System. |
EIT |
2022 |
DBLP DOI BibTeX RDF |
|
18 | The Duy Phan, Tran Duc Luong, Nguyen Hoang Quoc An, Quyen Nguyen Huu, Nghi Hoang Khoa, Van-Hau Pham |
Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors. |
SoICT |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang |
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. |
SciSec |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Wei Song, Xuezixiang Li, Sadia Afroz 0001, Deepali Garg, Dmitry Kuznetsov, Heng Yin 0001 |
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. |
AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Kyoung-Won Park, Seok-Jun Bu, Sung-Bae Cho |
Evolutionary Triplet Network of Learning Disentangled Malware Space for Malware Classification. |
HAIS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Cédric Herzog |
Etude des malware évasifs : conception, protection et détection. (Evasive Malware Study : conception, protection and detection). |
|
2022 |
RDF |
|
18 | Duy-Phuc Pham |
Leveraging side-channel signals for IoT malware classification and rootkit detection. (Analyse de malware en utilisant des techniques d'attaques par canaux auxiliaires). |
|
2022 |
RDF |
|
18 | Ali Mohammad Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen |
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. |
WoRMA@AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ilias Tsingenopoulos, Ali Mohammad Shafiei, Lieven Desmet, Davy Preuveneers, Wouter Joosen |
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. |
WoRMA@AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Gang Wang |
Open Challenges of Malware Detection under Concept Drift. |
WoRMA@AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto |
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. |
DIMVA |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita 0003, Nicholas Kolokotronis |
Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | Jashanpreet Singh Sraw, Keshav Kumar |
Using Static and Dynamic Malware features to perform Malware Ascription. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | |
Malfustection: Obfuscated Malware Detection and Malware Classification with Data Shortage by Combining Semi-Supervised and Contrastive Learning. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | Vasilios Koutsokostas, Constantinos Patsakis |
Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | Abhijitt Dhavlle, Sanket Shukla |
A Novel Malware Detection Mechanism based on Features Extracted from Converted Malware Binary Images. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | Luca Demetrio, Battista Biggio |
secml-malware: A Python Library for Adversarial Robustness Evaluation of Windows Malware Classifiers. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
18 | Bozhi Wu, Sen Chen 0001, Cuiyun Gao, Lingling Fan 0003, Yang Liu 0003, Weiping Wen, Michael R. Lyu |
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. |
ACM Trans. Softw. Eng. Methodol. |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Ke Shao, Qiang Xiong, Zhiming Cai |
FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. |
Secur. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Xintong Li, Qi Li |
An IRL-based malware adversarial generation method to evade anti-malware engines. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|