Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Antonio San Martino, Xavier Perramon |
Defending E-Banking Services: Antiphishing Approach. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
unsolicited email, spam, conversion |
10 | Christopher W. Clifton |
Opportunities for private and secure machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
10 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
10 | Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage |
When good instructions go bad: generalizing return-oriented programming to RISC. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
return-into-libc, return-oriented programming, RISC, SPARC |
10 | Antonio San Martino, Xavier Perramon |
Securing Web Banking Applications. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Shane Balfe, Kenneth G. Paterson |
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo Caceres, Habiba, Tanya Y. Berger-Wolf |
The Impact of Structural Changes on Predictions of Diffusion in Networks. |
ICDM Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Stephen H. Bach, Marcus A. Maloof |
Paired Learners for Concept Drift. |
ICDM |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Elizabeth Van Ruitenbeek, William H. Sanders |
Modeling Peer-to-Peer Botnets. |
QEST |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak |
Monitoring smartphones for anomaly detection. |
MOBILWARE |
2008 |
DBLP DOI BibTeX RDF |
mobile device, monitoring, anomaly detection, smartphone |
10 | Corrado Leita, Marc Dacier |
SGNET: Implementation insights. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Prateek Saxena, R. Sekar 0001, Varun Puranik |
Efficient fine-grained binary instrumentationwith applications to taint-tracking. |
CGO |
2008 |
DBLP DOI BibTeX RDF |
binary analysis/rewriting, taint tracking, information flow |
10 | Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash 0001, Kevin Borders |
Social networks and context-aware spam. |
CSCW |
2008 |
DBLP DOI BibTeX RDF |
privacy, social networks, spam, email, facebook |
10 | Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch |
Identifying and Analyzing Web Server Attacks. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
malicious web servers, client honeypots, Network forensics |
10 | Ejike Ofuonye, James Miller 0001 |
Resolving JavaScript Vulnerabilities in the Browser Runtime. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Zhiqiang Lin, Xiangyu Zhang 0001 |
Deriving input syntactic structure from execution. |
SIGSOFT FSE |
2008 |
DBLP DOI BibTeX RDF |
bottom-up grammar, input lineage, top-down grammar, reverse engineering, control dependence, syntax tree |
10 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
10 | Andrew Brown 0005, Mark Ryan 0001 |
Monitoring the Execution of Third-Party Software on Mobile Devices. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Fabrizio Baiardi, Daniele Sgandurra |
Secure Sharing of an ICT Infrastructure through Vinci. (PDF / PS) |
AIMS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
Malicious Code Detection Architecture Inspired by Human Immune System. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
System Call, Malicious Code Detection |
10 | Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Tsigas |
Strategies for repeated games with subsystem takeovers: implementable by deterministic and self-stabilizing automata (extended abstract). |
Autonomics |
2008 |
DBLP DOI BibTeX RDF |
folk-theorem, joint deviation, game theory, self-stabilization, finite-automata |
10 | Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee |
Lares: An Architecture for Secure Active Monitoring Using Virtualization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
virtualization, active monitoring, introspection |
10 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Z. Cliffe Schreuders, Christian Payne |
Reusability of Functionality-Based Application Confinement Policy Abstractions. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox |
10 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
10 | Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu |
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Timothy Fraser, Matthew R. Evenson, William A. Arbaugh |
VICI Virtual Machine Introspection for Cognitive Immunity. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta |
Understanding implications of DNS zone provisioning. |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
zone transfer, dns, domain name system |
10 | Linda Dailey Paulson |
News Briefs. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
semiconductor technology, LED technology, herd computing, wireless technology, spyware |
10 | William H. Allen, Richard Ford |
How Not to Be Seen II: The Defenders Fight Back. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Dianne Solomon |
Balancing Privacy and Risk in the E-Messaging World. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Iván Arce |
A Surprise Party (on Your Computer)? |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Fred B. Schneider |
Trusted Computing in Context. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh |
Software Protection through Anti-Debugging. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Brandi Ortega |
News Briefs. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vinoo Thomas, Nitin Jyoti |
Bot countermeasures. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
10 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Ronald C. Dodge, Corey Bertram, Daniel Ragsdale |
Remote Virtual Information Assurance Network. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jason Raber, Eric Laspe |
Emulated Breakpoint Debugger and Data Mining Using Detours. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jason Raber, Eric Laspe |
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Raman Sharykin, Phillip A. Porras |
Applying Formal Evaluation to Worm Defense Design. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis |
A Probabilistic Approach to Source Code Authorship Identification. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee |
An Empirical Study of Spam and Spam Vulnerable email Accounts. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jesus Molina, Xavier Chorin, Michel Cukier |
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation |
10 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mohammed S. Alam, Son Thanh Vuong |
APHIDS++: A Mobile Agent Based Intrusion Detection System. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Rui Joaquim, Carlos Ribeiro |
CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
vote manipulation, Internet voting |
10 | Martin Szydlowski, Christopher Kruegel, Engin Kirda |
Secure Input for Web Applications. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Tracking Darkports for Network Defense. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Phillip A. Porras |
Privacy-Enabled Global Threat Monitoring. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sampo Töyssy, Marko Helenius |
About malicious software in smartphones. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Leon Moonen, Spiros Mancoridis |
Code Based Software Security Assessments. |
WCRE |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié |
Thresholds for virus spread on networks. |
VALUETOOLS |
2006 |
DBLP DOI BibTeX RDF |
SIR epidemic, largest connected component, random graphs, spectral radius |
10 | Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi |
Attacking Confidentiality: An Agent Based Approach. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Brian O'Higgins |
Deep packet inspection comes to the desktop. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Phillip A. Porras, Vitaly Shmatikov |
Large-scale collection and sanitization of network security data: risks and challenges. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Amanda M. Holland-Minkley |
Cyberattacks: a lab-based introduction to computer security. |
SIGITE Conference |
2006 |
DBLP DOI BibTeX RDF |
laboratory coursework, computer security, IT education |
10 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Bharath Madhusudan, John W. Lockwood |
A Hardware-Accelerated System for Real-Time Worm Detection. |
IEEE Micro |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 |
Anomaly Detection in Computer Security and an Application to File System Accesses. |
ISMIS |
2005 |
DBLP DOI BibTeX RDF |
Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection |
10 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
10 | Kevin R. B. Butler, Patrick D. McDaniel |
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | João Schwarz da Silva |
Challenges and opportunities in ICT: a European perspective. |
Mobile Data Management |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
An Email Worm Vaccine Architecture. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Norman Feske, Christian Helmuth |
A Nitpicker's guide to a minimal-complexity secure GUI. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Volker Roth 0002 |
Obstacles to the Adoption of Mobile Agents. |
Mobile Data Management |
2004 |
DBLP DOI BibTeX RDF |
Mobile agents |
10 | Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
A Protocol for Reputation Management in Super-Peer Networks. |
DEXA Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Gordon W. Romney, Brady R. Stevenson |
An isolated, multi-platform network sandbox for teaching IT security system engineers. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula |
10 | Ajay Gupta 0002, Daniel C. DuVarney |
Using Predators to Combat Worms and Viruses: A Simulation-Based Study. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Steven Furnell |
Cybercrime: Vandalizing the Information Society. |
ICWE |
2003 |
DBLP DOI BibTeX RDF |
|
10 | John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks |
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. |
IWAN |
2003 |
DBLP DOI BibTeX RDF |
|
10 | George Lawton |
Virus Wars: Fewer Attacks, New Threats. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Junming Liu, Yuntao Zhao, Yongxin Feng, Yutao Hu, Xiangyu Ma |
SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers. |
J. Inf. Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto |
Enhancing android malware detection explainability through function call graph APIs. |
J. Inf. Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Zhen Liu, Ruoyu Wang 0002, Nathalie Japkowicz, Heitor Murilo Gomes, Bitao Peng, Wenbin Zhang 0002 |
SeGDroid: An Android malware detection method based on sensitive function call graph learning. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Meghna Dhalaria, Ekta Gandotra |
MalDetect: A classifier fusion approach for detection of android malware. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Shaojie Chen, Bo Lang, Hongyu Liu, Yikai Chen, Yucai Song |
Android malware detection method based on graph attention networks and deep fusion of multimodal features. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | L. Dhanya, R. Chitra |
A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Hashida Haidros Rahima Manzil, S. Manohar Naik |
Detection approaches for android malware: Taxonomy and review analysis. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Jiyun Yang, Can Gui |
Android malware detection framework based on sensitive opcodes and deep reinforcement learning. |
J. Intell. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Deepika Maddali |
Convnext-Eesnn: An effective deep learning based malware detection in edge based IIOT. |
J. Intell. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Abdulrahman Alamer |
A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu |
Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Pawan Kumar, Sukhdip Singh |
Security Testing of Android Apps Using Malware Analysis and XGboost Optimized by Adaptive Particle Swarm Optimization. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Shovana Das, Anshika Garg, Sanjay Kumar |
Stacking Ensemble-Based Approach for Malware Detection. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Chakradhar Verma, C. P. Gupta |
Effect of Vaccination on Stability of Wireless Sensor Network Against Malware Attack: An Epidemiological Model. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu |
Correction: Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Jitendra Kumar, Balaji Rajendran, Sithu D. Sudarsan |
Zero-Day Malware Classification and Detection Using Machine Learning. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Sidra Siddiqui, Tamim Ahmed Khan |
An Overview of Techniques for Obfuscated Android Malware Detection. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | John Musgrave, Alina Campan, Temesguen Messay Kebede, David Kapp, Boyang Wang |
Search and Retrieval in Semantic-Structural Representations of Novel Malware. |
Adv. Artif. Intell. Mach. Learn. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian |
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|