|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu 0005, Ian M. Molloy, Suresh Chari, Ce Zhang 0001, Quanlong Guan |
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Big Data ![In: IEEE Trans. Big Data 7(2), pp. 255-270, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Angelo Oliveira, Renato José Sassi |
Malware Analysis Datasets: Chimera Multimodal Deep Learning Android Malware Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
DOI RDF |
|
18 | Vasilios Koutsokostas, Constantinos Patsakis |
Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 125-136, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Yuheng Wei, Futai Zou |
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (1) ![In: Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I, pp. 44-61, 2021, Springer, 978-3-030-90018-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Zia, Muhammad Faisal Amjad, Haider Abbas, Zafar Iqbal, Anique Azhar, Ahsan Yasin, Hasan Iesar |
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: 19th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2021, Shenyang, China, October 20-22, 2021, pp. 117-124, 2021, IEEE, 978-1-6654-0036-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Samrah Mirza, Haider Abbas, Waleed Bin Shahid, Narmeen Shafqat, Mariagrazia Fugini, Zafar Iqbal, Muhammad Zia |
A Malware Evasion Technique for Auditing Android Anti-Malware Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2021, Bayonne, France, October 27-29, 2021, pp. 125-130, 2021, IEEE, 978-1-6654-2789-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz |
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings, pp. 130-150, 2021, Springer, 978-3-030-80824-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | ElMouatez Billah Karbab, Mourad Debbabi |
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings, pp. 319-340, 2021, Springer, 978-3-030-80824-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Tim Niklas Witte |
Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 164428-164452, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Bozhi Wu, Sen Chen 0001, Cuiyun Gao, Lingling Fan 0003, Yang Liu 0003, Weiping Wen, Michael R. Lyu |
Why an Android App is Classified as Malware? Towards Malware Classification Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.11516, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Rikima Mitsuhashi, Takahiro Shinagawa |
High-Accuracy Malware Classification with a Malware-Optimized Deep Learning Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.05258, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Alper Egitmen, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz, Omer Seyrekbasan, Ali Gökhan Yavuz |
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 6726147:1-6726147:10, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Emily J. Chaffey, Daniele Sgandurra |
Malware vs Anti-Malware Battle - Gotta Evade 'em All! ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSec ![In: 17th IEEE Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020, pp. 40-44, 2020, IEEE, 978-1-7281-8262-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Xiang Jin, Xiaofei Xing, Haroon Elahi, Guojun Wang 0001, Hai Jiang 0003 |
A Malware Detection Approach Using Malware Images and Autoencoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2020, Delhi, India, December 10-13, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-9866-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Malware intelligence: beyond malware analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 13(1/2), pp. 80-100, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Jun-Ho Hwang, Jin Kwak, Taejin Lee 0002 |
Fast k-NN based Malware Analysis in a Massive Malware Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 13(12), pp. 6145-6158, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | |
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.08356, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
18 | Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini |
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 15(2), pp. 109-125, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki |
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Advances in Networked-based Information Systems - The 22nd International Conference on Network-Based Information Systems, NBiS 2019, Oita, Japan, September 5-7, 2019., pp. 305-316, 2019, Springer, 978-3-030-29028-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Sai Manoj Pudukotai Dinakarrao, Hossein Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun |
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, Florence, Italy, March 25-29, 2019, pp. 776-781, 2019, IEEE, 978-3-9819263-2-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Zachary Wilkins, Nur Zincir-Heywood |
Darwinian malware detectors: a comparison of evolutionary solutions to android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2019, Prague, Czech Republic, July 13-17, 2019., pp. 1651-1658, 2019, ACM, 978-1-4503-6748-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Ke He, Dong Seong Kim 0001 |
Malware Detection with Malware Images using Deep Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 13th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019, pp. 95-102, 2019, IEEE, 978-1-7281-2777-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan V. Ghita, Nicholas Kolokotronis |
Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 19th International Conference, NEW2AN 2019, and 12th Conference, ruSMART 2019, St. Petersburg, Russia, August 26-28, 2019, Proceedings, pp. 65-76, 2019, Springer, 978-3-030-30858-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Alann Perini, Rodrigo Bonacin, Andre Gregio |
WebMBO: Uma Ontologia para Comportamento de Malware Web(WebMBO: an Ontology of Web Malware Behavior). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ONTOBRAS ![In: Proceedings of the XII Seminar on Ontology Research in Brazil and III Doctoral and Masters Consortium on Ontologies, Porto Alegre, Brazil, September 2nd-5th, 2019., 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
18 | Michael Schwarz 0001, Samuel Weiser, Daniel Gruss |
Practical Enclave Malware with Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp. 177-196, 2019, Springer, 978-3-030-22037-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp. 240-259, 2019, Springer, 978-3-030-22037-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert 0001, Fabio Roli |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1803.04173, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Abien Fred Agarap, Francis John Hill Pepito |
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.00318, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Belal Amro |
Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.04328, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Sevil Sen, Emre Aydogan, Ahmet Ilhan Aysan |
Coevolution of Mobile Malware and Anti-Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(10), pp. 2563-2574, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Francesco Mercaldo, Andrea Saracino |
Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: 2018 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2018, Rio de Janeiro, Brazil, July 8-13, 2018, pp. 1-7, 2018, IEEE, 978-1-5090-6020-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Arun Lakhotia, Vivek Notani, Charles LeDoux |
Malware Economics and its Implication to Anti-Malware Situational Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4565-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera |
A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Proceedings of the 19th International Conference on Distributed Computing and Networking, ICDCN 2018, Varanasi, India, January 4-7, 2018, pp. 49:1-49:4, 2018, ACM, 978-1-4503-6372-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Yujie Fan, Shifu Hou, Yiming Zhang 0002, Yanfang Ye 0001, Melih Abdulhayoglu |
Gotcha - Sly Malware!: Scorpion A Metagraph2vec Based Malware Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, London, UK, August 19-23, 2018, pp. 253-262, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi 0001 |
ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, December 4-7, 2018, pp. 257-262, 2018, IEEE, 978-1-5386-5700-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert 0001, Fabio Roli |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSIPCO ![In: 26th European Signal Processing Conference, EUSIPCO 2018, Roma, Italy, September 3-7, 2018, pp. 533-537, 2018, IEEE, 978-9-0827-9701-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Huu-Vu Nguyen |
On CARET model-checking of pushdown systems: application to malware detection. (CARET model-checking d'automates à piles: application à la détection de malware). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
18 | Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt |
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 3-23, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow |
Evasive Malware via Identifier Implanting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 162-184, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Michael Brengel, Christian Rossow |
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 24-45, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Yanko Baychev, Leyla Bilge |
Spearphishing Malware: Do We Really Know the Unknown? ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings, pp. 46-66, 2018, Springer, 978-3-319-93410-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Liu Liu 0004, Baosheng Wang, Bo Yu 0008, Qiuxi Zhong |
Automatic malware classification and new malware detection using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 18(9), pp. 1336-1347, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto |
Analysis of malware download sites by focusing on time series variation of malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 22, pp. 301-313, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Jiang Ming 0002, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao |
Impeding behavior-based malware analysis via replacement attacks to malware specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 13(3), pp. 193-207, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Yinxing Xue, Guozhu Meng, Yang Liu 0003, Tian Huat Tan, Hongxu Chen 0001, Jun Sun 0001, Jie Zhang 0002 |
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(7), pp. 1529-1544, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera |
A novel malware analysis for malware detection and classification using machine learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017., pp. 107-113, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Sunoh Choi, Sungwook Jang, Youngsoo Kim, Jong-Hyun Kim |
Malware detection using malware image and deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2017, Jeju Island, Korea (South), October 18-20, 2017, pp. 1193-1195, 2017, IEEE, 978-1-5090-4032-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Ying Fang, Bo Yu 0008, Yong Tang 0005, Liu Liu 0004, Zexin Lu, Yi Wang 0036, Qiang Yang |
A New Malware Classification Approach Based on Malware Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP (2) ![In: Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II, pp. 173-189, 2017, Springer, 978-3-319-59869-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Suyash Jadhav, Tae Tom Oh, Jaehoon (Paul) Jeong, Young Ho Kim, Jeong Neyo Kim |
An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 31st International Conference on Advanced Information Networking and Applications Workshops, AINA 2017 Workshops, Taipei, Taiwan, March 27-29, 2017, pp. 370-374, 2017, IEEE Computer Society, 978-1-5090-6231-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Jianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun |
MGeT: Malware Gene-Based Malware Dynamic Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSP ![In: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, Wuhan, China, March 17 - 19, 2017, pp. 96-101, 2017, ACM, 978-1-4503-4867-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang |
Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberC ![In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2017, Nanjing, China, October 12-14, 2017, pp. 17-20, 2017, IEEE, 978-1-5386-2209-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Qublai Khan Ali Mirza |
A cloud-based intelligent and energy efficient malware detection framework: a framework for cloud-based, energy efficient, and reliable malware detection in real-time based on training SVM, decision tree, and boosting using specified heuristics anomalies of portable executable files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
18 | George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert 0001 |
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 119-138, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero |
Measuring and Defeating Anti-Instrumentation-Equipped Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 73-96, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard |
Malware Guard Extension: Using SGX to Conceal Cache Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 3-24, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou |
Deep Ground Truth Analysis of Current Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 252-276, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua |
DynODet: Detecting Dynamic Obfuscation in Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings, pp. 97-118, 2017, Springer, 978-3-319-60875-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Soto Carabantes, Cristian Barría Huidobro, David Cordero Vidal |
Optimation through Automation of Malware Update Process, Capable of Evading Anti-Malware Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Res. Comput. Sci. ![In: Res. Comput. Sci. 127, pp. 101-110, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Mohd Faizal Ab Razak, Nor Badrul Anuar, Rosli Salleh, Ahmad Firdaus |
The rise of "malware": Bibliometric analysis of malware study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 75, pp. 58-76, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | TaeJin Lee 0002, Jin Kwak |
Effective and Reliable Malware Group Classification for a Massive Malware Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 12(5), pp. 4601847:1-4601847:6, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Sanjeev Das, Yang Liu 0003, Wei Zhang 0012, Mahinthan Chandramohan |
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(2), pp. 289-302, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Salman Yousaf, Umar Iqbal 0002, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar |
Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016, pp. 572-582, 2016, IEEE Computer Society, 978-1-4673-8891-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu 0003, Jie Zhang 0002, Tieming Chen |
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, pp. 365-376, 2016, ACM, 978-1-4503-4233-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar 0001 |
Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016, pp. 423-427, 2016, IEEE Computer Society, 978-1-5090-0990-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Yasuyuki Tanaka, Atsuhiro Goto |
Analysis of malware download sites by focusing on time series variation of malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016, pp. 173-179, 2016, IEEE Computer Society, 978-1-5090-0679-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Tae (Tom) Oh, Hwa Shin Moon, Young Ho Kim, Jeong Neyo Kim, Bill Stackpole |
Android malware analysis and conceptual malware mitigation approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2016, Jeju Island, South Korea, October 19-21, 2016, pp. 684-693, 2016, IEEE, 978-1-5090-1325-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu 0003, Jie Zhang 0002, Annamalai Narayanan |
Semantic modelling of Android malware for effective malware comprehension, detection, and classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, Saarbrücken, Germany, July 18-20, 2016, pp. 306-317, 2016, ACM, 978-1-4503-4390-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu 0005, Suresh Chari, Ce Zhang 0001 |
Android malware development on public malware scanning platforms: A large-scale data-driven study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2016 IEEE International Conference on Big Data (IEEE BigData 2016), Washington DC, USA, December 5-8, 2016, pp. 1090-1099, 2016, IEEE Computer Society, 978-1-4673-9005-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith 0001 |
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pp. 158-177, 2016, IEEE Computer Society, 978-1-5090-0824-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Anitta Patience Namanya |
A heuristic featured based quantification framework for efficient malware detection: measuring the malicious intent of a file using anomaly probabilistic scoring and evidence combinational theory with fuzzy hashing for malware detection in portable executable files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
18 | Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert 0001 |
Adaptive Semantics-Aware Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 419-439, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon |
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 142-162, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Comprehensive Analysis and Detection of Flash-Based Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 101-121, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz 0001, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu 0002, George Yiu, Anthony D. Joseph, J. D. Tygar |
Reviewer Integration and Performance Measurement for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 122-141, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Wenyi Huang, Jack W. Stokes |
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 399-418, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Ismahani Binti Ismail, Muhammad Nadzir Marsono, Ban Mohammed Khammas, Sulaiman Mohd Nor |
Incorporating known malware signatures to classify new malware variants in network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 25(6), pp. 471-489, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev |
Malware-aware processors: A framework for efficient online malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 21st IEEE International Symposium on High Performance Computer Architecture, HPCA 2015, Burlingame, CA, USA, February 7-11, 2015, pp. 651-661, 2015, IEEE Computer Society, 978-1-4799-8930-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio |
Composition-Malware: Building Android Malware at Run Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, pp. 318-326, 2015, IEEE Computer Society, 978-1-4673-6590-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Gandeva B. Satrya, Niken D. W. Cahyani, Ritchie F. Andreta |
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 17th International Conference on Electronic Commerce 2015, Seoul, Republic of Korea, August 3-5, 2015, pp. 5:1-5:4, 2015, ACM, 978-1-4503-3461-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Jiyeon Choi, HeeSeok Kim, Jangwon Choi 0001, Jungsuk Song 0001 |
A Malware Classification Method Based on Generic Malware Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Neural Information Processing - 22nd International Conference, ICONIP 2015, Istanbul, Turkey, November 9-12, 2015, Proceedings, Part II, pp. 329-336, 2015, Springer, 978-3-319-26534-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Tobias Wüchner, Martín Ochoa, Alexander Pretschner |
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pp. 98-118, 2015, Springer, 978-3-319-20549-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Arvind Kumar Misra, Maitri Verma, Anupama Sharma |
Capturing the interplay between malware and anti-malware in a computer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 229, pp. 340-349, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Ismahani Binti Ismail, Sulaiman Mohd Nor, Muhammad Nadzir Marsono |
Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Comput. Intell. Soft Comput. ![In: Appl. Comput. Intell. Soft Comput. 2014, pp. 197961:1-197961:8, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Devendra Kumar Mahawer, A. Nagaraju 0001 |
Metamorphic malware detection using base malware identification approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(11), pp. 1719-1733, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jae-wook Jang, Jaesung Yun, Jiyoung Woo, Huy Kang Kim |
Andro-profiler: anti-malware system based on behavior profiling of mobile malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: 23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume, pp. 737-738, 2014, ACM, 978-1-4503-2745-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon |
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: IEEE 38th Annual Computer Software and Applications Conference, COMPSAC 2014, Vasteras, Sweden, July 21-25, 2014, pp. 384-393, 2014, IEEE Computer Society, 978-1-4799-3575-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof |
Malware behavior image for malware variant identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBAST ![In: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014, pp. 238-243, 2014, IEEE, 978-1-4799-6444-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Radoniaina Andriatsimandefitra |
Caractérisation et détection de malware Android basées sur les flux d'information. (Characterization and detection of Android malware based on information flows). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
18 | Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer |
Identifying Shared Software Components to Support Malware Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 21-40, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Dennis Andriesse, Herbert Bos |
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 41-50, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Andrew G. West, Aziz Mohaisen |
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings, pp. 152-171, 2014, Springer, 978-3-319-08508-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad |
Profiling mobile malware behaviour through hybrid malware analysis approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia, December 4-6, 2013, pp. 78-84, 2013, IEEE, 978-1-4799-2989-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Shahid Alam, R. Nigel Horspool, Issa Traoré |
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 233-240, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Anand Paturi, Manoj Cherukuri, John Donahue, Srinivas Mukkamala |
Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2013 International Conference on Collaboration Technologies and Systems, CTS 2013, San Diego, CA, USA, May 20-24, 2013, pp. 149-154, 2013, IEEE, 978-1-4673-6403-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Deguang Kong, Guanhua Yan |
Discriminant malware distance learning on structural information for automated malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013, pp. 1357-1365, 2013, ACM, 978-1-4503-2174-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Deguang Kong, Guanhua Yan |
Discriminant malware distance learning on structuralinformation for automated malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '13, Pittsburgh, PA, USA, June 17-21, 2013, pp. 347-348, 2013, ACM, 978-1-4503-1900-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Hsien-De Huang, Chang-Shing Lee, Mei-Hui Wang, Hung-Yu Kao |
An IT2FLS-Based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, Manchester, SMC 2013, United Kingdom, October 13-16, 2013, pp. 4652-4657, 2013, IEEE, 978-0-7695-5154-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Guanhua Yan, Nathan Brown, Deguang Kong |
Exploring Discriminatory Features for Automated Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 41-61, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Gen Lu, Saumya K. Debray |
Weaknesses in Defenses against Web-Borne Malware - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 139-149, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Chengyu Song, Paul Royal, Wenke Lee |
Impeding Automated Malware Analysis with Environment-sensitive Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSec ![In: 7th USENIX Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012, 2012, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
Displaying result #501 - #600 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|