The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu 0005, Ian M. Molloy, Suresh Chari, Ce Zhang 0001, Quanlong Guan A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. Search on Bibsonomy IEEE Trans. Big Data The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Angelo Oliveira, Renato José Sassi Malware Analysis Datasets: Chimera Multimodal Deep Learning Android Malware Detection Method. Search on Bibsonomy 2021   DOI  RDF
18Vasilios Koutsokostas, Constantinos Patsakis Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Yuheng Wei, Futai Zou Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces. Search on Bibsonomy SecureComm (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Muhammad Zia, Muhammad Faisal Amjad, Haider Abbas, Zafar Iqbal, Anique Azhar, Ahsan Yasin, Hasan Iesar A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware. Search on Bibsonomy EUC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Samrah Mirza, Haider Abbas, Waleed Bin Shahid, Narmeen Shafqat, Mariagrazia Fugini, Zafar Iqbal, Muhammad Zia A Malware Evasion Technique for Auditing Android Anti-Malware Solutions. Search on Bibsonomy WETICE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18ElMouatez Billah Karbab, Mourad Debbabi PetaDroid: Adaptive Android Malware Detection Using Deep Learning. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Tim Niklas Witte Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Bozhi Wu, Sen Chen 0001, Cuiyun Gao, Lingling Fan 0003, Yang Liu 0003, Weiping Wen, Michael R. Lyu Why an Android App is Classified as Malware? Towards Malware Classification Interpretation. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
18Rikima Mitsuhashi, Takahiro Shinagawa High-Accuracy Malware Classification with a Malware-Optimized Deep Learning Model. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
18Alper Egitmen, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz, Omer Seyrekbasan, Ali Gökhan Yavuz Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Emily J. Chaffey, Daniele Sgandurra Malware vs Anti-Malware Battle - Gotta Evade 'em All! Search on Bibsonomy VizSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Xiang Jin, Xiaofei Xing, Haroon Elahi, Guojun Wang 0001, Hai Jiang 0003 A Malware Detection Approach Using Malware Images and Autoencoders. Search on Bibsonomy MASS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Ekta Gandotra, Divya Bansal, Sanjeev Sofat Malware intelligence: beyond malware analysis. Search on Bibsonomy Int. J. Adv. Intell. Paradigms The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Jun-Ho Hwang, Jin Kwak, Taejin Lee 0002 Fast k-NN based Malware Analysis in a Massive Malware Environment. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18 New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
18Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. Search on Bibsonomy NBiS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Sai Manoj Pudukotai Dinakarrao, Hossein Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Zachary Wilkins, Nur Zincir-Heywood Darwinian malware detectors: a comparison of evolutionary solutions to android malware. Search on Bibsonomy GECCO (Companion) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Ke He, Dong Seong Kim 0001 Malware Detection with Malware Images using Deep Learning Techniques. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan V. Ghita, Nicholas Kolokotronis Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation. Search on Bibsonomy NEW2AN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Alann Perini, Rodrigo Bonacin, Andre Gregio WebMBO: Uma Ontologia para Comportamento de Malware Web(WebMBO: an Ontology of Web Malware Behavior). Search on Bibsonomy ONTOBRAS The full citation details ... 2019 DBLP  BibTeX  RDF
18Michael Schwarz 0001, Samuel Weiser, Daniel Gruss Practical Enclave Malware with Intel SGX. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert 0001, Fabio Roli Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
18Abien Fred Agarap, Francis John Hill Pepito Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
18Belal Amro Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
18Sevil Sen, Emre Aydogan, Ahmet Ilhan Aysan Coevolution of Mobile Malware and Anti-Malware. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Francesco Mercaldo, Andrea Saracino Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Arun Lakhotia, Vivek Notani, Charles LeDoux Malware Economics and its Implication to Anti-Malware Situational Awareness. Search on Bibsonomy CyberSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach. Search on Bibsonomy ICDCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Yujie Fan, Shifu Hou, Yiming Zhang 0002, Yanfang Ye 0001, Melih Abdulhayoglu Gotcha - Sly Malware!: Scorpion A Metagraph2vec Based Malware Detection System. Search on Bibsonomy KDD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi 0001 ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family. Search on Bibsonomy PRDC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert 0001, Fabio Roli Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. Search on Bibsonomy EUSIPCO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Huu-Vu Nguyen On CARET model-checking of pushdown systems: application to malware detection. (CARET model-checking d'automates à piles: application à la détection de malware). Search on Bibsonomy 2018   RDF
18Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow Evasive Malware via Identifier Implanting. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Michael Brengel, Christian Rossow MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Yanko Baychev, Leyla Bilge Spearphishing Malware: Do We Really Know the Unknown? Search on Bibsonomy DIMVA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Liu Liu 0004, Baosheng Wang, Bo Yu 0008, Qiuxi Zhong Automatic malware classification and new malware detection using machine learning. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto Analysis of malware download sites by focusing on time series variation of malware. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Jiang Ming 0002, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao Impeding behavior-based malware analysis via replacement attacks to malware specifications. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Yinxing Xue, Guozhu Meng, Yang Liu 0003, Tian Huat Tan, Hongxu Chen 0001, Jun Sun 0001, Jie Zhang 0002 Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera A novel malware analysis for malware detection and classification using machine learning algorithms. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Sunoh Choi, Sungwook Jang, Youngsoo Kim, Jong-Hyun Kim Malware detection using malware image and deep learning. Search on Bibsonomy ICTC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Ying Fang, Bo Yu 0008, Yong Tang 0005, Liu Liu 0004, Zexin Lu, Yi Wang 0036, Qiang Yang A New Malware Classification Approach Based on Malware Dynamic Analysis. Search on Bibsonomy ACISP (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Suyash Jadhav, Tae Tom Oh, Jaehoon (Paul) Jeong, Young Ho Kim, Jeong Neyo Kim An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency. Search on Bibsonomy AINA Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Jianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun MGeT: Malware Gene-Based Malware Dynamic Analyses. Search on Bibsonomy ICCSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. Search on Bibsonomy CyberC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Qublai Khan Ali Mirza A cloud-based intelligent and energy efficient malware detection framework: a framework for cloud-based, energy efficient, and reliable malware detection in real-time based on training SVM, decision tree, and boosting using specified heuristics anomalies of portable executable files. Search on Bibsonomy 2017   RDF
18George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert 0001 Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero Measuring and Defeating Anti-Instrumentation-Equipped Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard Malware Guard Extension: Using SGX to Conceal Cache Attacks. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou Deep Ground Truth Analysis of Current Android Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua DynODet: Detecting Dynamic Obfuscation in Malware. Search on Bibsonomy DIMVA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Daniel Soto Carabantes, Cristian Barría Huidobro, David Cordero Vidal Optimation through Automation of Malware Update Process, Capable of Evading Anti-Malware Systems. Search on Bibsonomy Res. Comput. Sci. The full citation details ... 2016 DBLP  BibTeX  RDF
18Mohd Faizal Ab Razak, Nor Badrul Anuar, Rosli Salleh, Ahmad Firdaus The rise of "malware": Bibliometric analysis of malware study. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18TaeJin Lee 0002, Jin Kwak Effective and Reliable Malware Group Classification for a Massive Malware Environment. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Sanjeev Das, Yang Liu 0003, Wei Zhang 0012, Mahinthan Chandramohan Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Salman Yousaf, Umar Iqbal 0002, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. Search on Bibsonomy DSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu 0003, Jie Zhang 0002, Tieming Chen Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar 0001 Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Yasuyuki Tanaka, Atsuhiro Goto Analysis of malware download sites by focusing on time series variation of malware. Search on Bibsonomy ISCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Tae (Tom) Oh, Hwa Shin Moon, Young Ho Kim, Jeong Neyo Kim, Bill Stackpole Android malware analysis and conceptual malware mitigation approaches. Search on Bibsonomy ICTC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu 0003, Jie Zhang 0002, Annamalai Narayanan Semantic modelling of Android malware for effective malware comprehension, detection, and classification. Search on Bibsonomy ISSTA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu 0005, Suresh Chari, Ce Zhang 0001 Android malware development on public malware scanning platforms: A large-scale data-driven study. Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith 0001 Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Anitta Patience Namanya A heuristic featured based quantification framework for efficient malware detection: measuring the malicious intent of a file using anomaly probabilistic scoring and evidence combinational theory with fuzzy hashing for malware detection in portable executable files. Search on Bibsonomy 2016   RDF
18Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert 0001 Adaptive Semantics-Aware Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck Comprehensive Analysis and Detection of Flash-Based Malware. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz 0001, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu 0002, George Yiu, Anthony D. Joseph, J. D. Tygar Reviewer Integration and Performance Measurement for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Wenyi Huang, Jack W. Stokes MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Ismahani Binti Ismail, Muhammad Nadzir Marsono, Ban Mohammed Khammas, Sulaiman Mohd Nor Incorporating known malware signatures to classify new malware variants in network traffic. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev Malware-aware processors: A framework for efficient online malware detection. Search on Bibsonomy HPCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio Composition-Malware: Building Android Malware at Run Time. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Gandeva B. Satrya, Niken D. W. Cahyani, Ritchie F. Andreta The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems. Search on Bibsonomy ICEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Jiyeon Choi, HeeSeok Kim, Jangwon Choi 0001, Jungsuk Song 0001 A Malware Classification Method Based on Generic Malware Information. Search on Bibsonomy ICONIP (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Tobias Wüchner, Martín Ochoa, Alexander Pretschner Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Arvind Kumar Misra, Maitri Verma, Anupama Sharma Capturing the interplay between malware and anti-malware in a computer network. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ismahani Binti Ismail, Sulaiman Mohd Nor, Muhammad Nadzir Marsono Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures. Search on Bibsonomy Appl. Comput. Intell. Soft Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Devendra Kumar Mahawer, A. Nagaraju 0001 Metamorphic malware detection using base malware identification approach. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jae-wook Jang, Jaesung Yun, Jiyoung Woo, Huy Kang Kim Andro-profiler: anti-malware system based on behavior profiling of mobile malware. Search on Bibsonomy WWW (Companion Volume) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? Search on Bibsonomy COMPSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof Malware behavior image for malware variant identification. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Radoniaina Andriatsimandefitra Caractérisation et détection de malware Android basées sur les flux d'information. (Characterization and detection of Android malware based on information flows). Search on Bibsonomy 2014   RDF
18Brian E. Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer Identifying Shared Software Components to Support Malware Forensics. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Dennis Andriesse, Herbert Bos Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Andrew G. West, Aziz Mohaisen Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad Profiling mobile malware behaviour through hybrid malware analysis approach. Search on Bibsonomy IAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Shahid Alam, R. Nigel Horspool, Issa Traoré MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Anand Paturi, Manoj Cherukuri, John Donahue, Srinivas Mukkamala Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis). Search on Bibsonomy CTS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Deguang Kong, Guanhua Yan Discriminant malware distance learning on structural information for automated malware classification. Search on Bibsonomy KDD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Deguang Kong, Guanhua Yan Discriminant malware distance learning on structuralinformation for automated malware classification. Search on Bibsonomy SIGMETRICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Hsien-De Huang, Chang-Shing Lee, Mei-Hui Wang, Hung-Yu Kao An IT2FLS-Based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT). Search on Bibsonomy SMC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Guanhua Yan, Nathan Brown, Deguang Kong Exploring Discriminatory Features for Automated Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Gen Lu, Saumya K. Debray Weaknesses in Defenses against Web-Borne Malware - (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Chengyu Song, Paul Royal, Wenke Lee Impeding Automated Malware Analysis with Environment-sensitive Malware. Search on Bibsonomy HotSec The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #501 - #600 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license