The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Karen McDowell Now that we are all so well-educated about spyware, can we put the bad guys out of business? Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF antispyware, greyware, malware, spyware, bots, adware
25Michael Blanco, Kay White Reactive to proactive support: a corn dance. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cross-training, support desk, work-study, security, performance, project management, malware, virus, staffing
25Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong ExecRecorder: VM-based full-system replay for attack analysis and system recovery. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, recovery, malware, worms, replay, invasive software
25Neal Leavitt Mobile Phones: The Next Frontier for Hackers? Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, cell phones, wireless security, viruses
25John Aycock, Ken Barker 0001 Viruses 101. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-virus software, university course, malware, computer viruses
25Anil Somayaji How to Win and Evolutionary Arms Race. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF virus protection, malware, secure systems
25Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
23Philip O'Kane, Sakir Sezer, Kieran McLaughlin Obfuscation: The Hidden Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF packer, metamorphism, computer security, polymorphism, malware, obfuscation
23Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao Correlation Analysis between Spamming Botnets and Malware Infected Hosts. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF darknet, spam, malware, honeypot, botnet, correlation analysis
23Brijesh Kumar, Constantine Katsinis A Network Based Approach to Malware Detection in Large IT Infrastructures. Search on Bibsonomy NCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF host security, distributed virus detection, malware detection, Infrastructure security
23Dmitriy Komashinskiy, Igor V. Kotenko Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. Search on Bibsonomy PDP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF positionally dependent features, static and dynamic detection, classification, feature selection, malware
23Klaus Hildebrandt, Igor Podebrad, Bernd Klauer A Computer Architecture with Hardwarebased Malware Detection. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure computer architecture, hardware based security, multicore, malware
23Grégoire Jacob, Eric Filiol, Hervé Debar Formalization of Viruses and Malware Through Process Algebras. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF process algebra, detection, malware, prevention
23Asaf Shabtai Malware Detection on Mobile Devices. Search on Bibsonomy Mobile Data Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security, Machine Learning, Mobile Devices, Malware, Android, SELinux
23Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto Vulnerability in Public Malware Sandbox Analysis Systems. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Malware sandbox analysis, Sandbox detection
23Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Probabilistic Optimization, Specification, Malware, Software Security
23Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero Identifying Dormant Functionality in Malware Programs. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dormant functionality, binary analysis, malware analysis
23Silvio Cesare, Yang Xiang 0001 A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF unpacking, Network security, emulation, malware, structural classification
23Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware spreading, topology control attacks, closed queuing networks
23Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu Static Analysis of Malware to Detect Exception Return. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Obfuscation, Disassemble
23Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi T-PIM: Trusted Password Input Method against Data Stealing Malware. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Stealing Malware, Virus, Hypervisor, Spyware
23Roland Gabriel, Tobias Hoppe, Alexander Pastwa, Sebastian Sowa Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results. Search on Bibsonomy DBKDA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Log Data, Security Information and Event Management, Data Mining, Cluster Analysis, Malware, Information Security Management, Association Analysis
23Liang Xie 0002, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu Designing System-Level Defenses against Cellphone Malware. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, access control, Malware, Turing test
23Yu Zhang, Bharat K. Bhargava, Philipp Hurni The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Collaboration, Network Security, Thread, Malware, Propagation
23Fernando C. Colón Osorio, Zachi Klopman An initial analysis and presentation of malware exhibiting swarm-like behavior. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF swarm worms, swarm intelligence, malware, emergent behavior, internet worms
23Michael Vedders, Paul Boyum Helping students help themselves: malware removal. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, worms, virus, spyware, kiosk, black hole, VLAN
20M. H. R. Khouzani, Saswati Sarkar, Eitan Altman Optimal propagation of security patches in mobile wireless networks: extended abstract. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic patching, security-performance trade-off, optimal control
20Pradip De, Yonghe Liu, Sajal K. Das 0001 An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Márk Jelasity, Vilmos Bilicki Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Fabian Hugelshofer, Paul Smith 0001, David Hutchison 0001, Nicholas J. P. Race OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, intrusion detection, wireless mesh network, resource constrained devices
20Asaf Shabtai, Uri Kanonov, Yuval Elovici Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF KBTA, Host-Based Intrusion Detection Systems, Mobile Devices
20Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras ALICE@home: Distributed Framework for Detecting Malicious Sites. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Andrew Brown 0005, Mark Ryan 0001 Context-Aware Monitoring of Untrusted Mobile Applications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Steve Webb, James Caverlee, Calton Pu Predicting web spam with HTTP session information. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HTTP session information, classification, web spam
20Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan A hypervisor-based system for protecting software runtime memory and persistent storage. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor
20Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu Formal Abstraction of Semantics for Detecting Malicious Code. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Philippe Beaucamps, Eric Filiol On the possibility of practically obfuscating programs towards a unified perspective of code protection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Peter C. S. Kwan, Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Napoleon Paxton, Gail-Joon Ahn, Bill Chu Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
20Frank H. Katz Campus-wide spyware and virus removal as a method of teaching information security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security awareness programs, design, information security, information security education
20Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
20Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala Polymorphic Malicious Executable Scanner by API Sequence Analysis. Search on Bibsonomy HIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi A Framework for Behavior-Based Malware Analysis in the Cloud. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Evolvable malware. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genetic algorithm, computer virus, artificial evolution
19Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
19Zhiqiang Lin, Ryan D. Riley, Dongyan Xu Polymorphing Software by Randomizing Data Structure Layout. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF infection efficiency, wireless ad hoc networks, closed queuing networks
19George Lawton Is It Finally Time to Worry about Mobile Malware? Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Grégoire Jacob, Hervé Debar, Eric Filiol Behavioral detection of malware: from a survey towards an established taxonomy. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung Protecting the web: phishing, malware, and other security threats. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, dns
19Luca Carettoni, Claudio Merloni, Stefano Zanero Studying Bluetooth Malware Propagation: The BlueBag Project. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Urs E. Gattiker Bologna process revisited: educating information security and malware experts. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Pattarasinee Bhattarakosol, Vasin Suttichaya Multiple Equivalent Scale Scan: An Enhancing Technique for Malware Detection. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Lifu Wang, Partha Dasgupta Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis A Study of Malcode-Bearing Documents. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sandbox Diversity, Intrusion Detection, N-gram
19Mohamed R. Chouchane, Arun Lakhotia Using engine signature to detect metamorphic malware. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metamorphic engine, virus scanner
19Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch SubVirt: Implementing malware with virtual machines. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Roger Karrer EC: an edge-based architecture against DDoS attacks and malware spread. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Michael G. Bailey Malware resistant networking using system diversity. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF monoculture, network, diversity, survivability, epidemic
19Hal Berghel Malware month. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin A hybrid malware analysis approach for identifying process-injection malware based on machine learning. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Dong-Ok Won, Yong-Nam Jang, Seong-Whan Lee PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Furqan Rustam, Imran Ashraf, Anca Delia Jurcut, Ali Kashif Bashir, Yousaf Bin Zikria Malware detection using image representation of malware data and transfer learning. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ahmed Sabbah, Mohammed Kharma, Mustafa Jarrar Creating Android Malware Knowledge Graph Based on a Malware Ontology. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Younghoon Ban, Jeong Hyun Yi, Haehyun Cho Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sanyam Jain, Sumaiya Thaseen Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware Categories. Search on Bibsonomy ICCST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tejpal Sharma, Dhavleesh Rattan, Parneet Kaur, Anuj Kumar Gupta, Jagbir Singh Gill Enhancing Android Malware Detection: CFS Based Texture Feature Selection and Ensembled Classifier for Malware App Analysis. Search on Bibsonomy RTIP2R (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hemant Rathore, Praneeth B, Sundaraja Sitharama Iyengar, Sanjay K. Sahay Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. Search on Bibsonomy ICCS (5) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth 0001 Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Manoj D. Shelar, S. Srinivasa Rao 0004 Deep malware hunter based unrivaled malware detection schema thru cache retrospective empiricism. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Niusen Chen, Bo Chen 0028 Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Sebastian Grochola, Andrew Milliner A comparison, analysis, and provision of methods in identifying types of malware and means of malware detection and protection against them. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Mauro Conti, Shubham Khandhar, Vinod P. 0001 A few-shot malware classification approach for unknown family recognition using malware feature visualization. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Rajesh Kumar, Geetha Subbiah Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18David Arnold 0006, Charlotte David, Jafar Saniie PowerShell Malware Analysis Using a Novel Malware Rating System. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18The Duy Phan, Tran Duc Luong, Nguyen Hoang Quoc An, Quyen Nguyen Huu, Nghi Hoang Khoa, Van-Hau Pham Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors. Search on Bibsonomy SoICT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. Search on Bibsonomy SciSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Wei Song, Xuezixiang Li, Sadia Afroz 0001, Deepali Garg, Dmitry Kuznetsov, Heng Yin 0001 MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. Search on Bibsonomy AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Kyoung-Won Park, Seok-Jun Bu, Sung-Bae Cho Evolutionary Triplet Network of Learning Disentangled Malware Space for Malware Classification. Search on Bibsonomy HAIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Cédric Herzog Etude des malware évasifs : conception, protection et détection. (Evasive Malware Study : conception, protection and detection). Search on Bibsonomy 2022   RDF
18Duy-Phuc Pham Leveraging side-channel signals for IoT malware classification and rootkit detection. (Analyse de malware en utilisant des techniques d'attaques par canaux auxiliaires). Search on Bibsonomy 2022   RDF
18Ali Mohammad Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. Search on Bibsonomy WoRMA@AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Ilias Tsingenopoulos, Ali Mohammad Shafiei, Lieven Desmet, Davy Preuveneers, Wouter Joosen Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. Search on Bibsonomy WoRMA@AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Gang Wang Open Challenges of Malware Detection under Concept Drift. Search on Bibsonomy WoRMA@AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita 0003, Nicholas Kolokotronis Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Jashanpreet Singh Sraw, Keshav Kumar Using Static and Dynamic Malware features to perform Malware Ascription. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18 Malfustection: Obfuscated Malware Detection and Malware Classification with Data Shortage by Combining Semi-Supervised and Contrastive Learning. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Vasilios Koutsokostas, Constantinos Patsakis Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Abhijitt Dhavlle, Sanket Shukla A Novel Malware Detection Mechanism based on Features Extracted from Converted Malware Binary Images. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Luca Demetrio, Battista Biggio secml-malware: A Python Library for Adversarial Robustness Evaluation of Windows Malware Classifiers. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Bozhi Wu, Sen Chen 0001, Cuiyun Gao, Lingling Fan 0003, Yang Liu 0003, Weiping Wen, Michael R. Lyu Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Ke Shao, Qiang Xiong, Zhiming Cai FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Xintong Li, Qi Li An IRL-based malware adversarial generation method to evade anti-malware engines. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license