Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Antonio San Martino, Xavier Perramon |
Defending E-Banking Services: Antiphishing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 93-98, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 3-14, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unsolicited email, spam, conversion |
10 | Christopher W. Clifton |
Opportunities for private and secure machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 31-32, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
10 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 403-416, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
10 | Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage |
When good instructions go bad: generalizing return-oriented programming to RISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 27-38, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
return-into-libc, return-oriented programming, RISC, SPARC |
10 | Antonio San Martino, Xavier Perramon |
Securing Web Banking Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 314-315, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Shane Balfe, Kenneth G. Paterson |
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 171-175, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo Caceres, Habiba, Tanya Y. Berger-Wolf |
The Impact of Structural Changes on Predictions of Diffusion in Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 939-948, 2008, IEEE Computer Society, 978-0-7695-3503-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Stephen H. Bach, Marcus A. Maloof |
Paired Learners for Concept Drift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 23-32, 2008, IEEE Computer Society, 978-0-7695-3502-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Elizabeth Van Ruitenbeek, William H. Sanders |
Modeling Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QEST ![In: Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 14-17 September 2008, Saint-Malo, France, pp. 307-316, 2008, IEEE Computer Society, 978-0-7695-3360-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak |
Monitoring smartphones for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008, pp. 40, 2008, 978-1-59593-984-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile device, monitoring, anomaly detection, smartphone |
10 | Corrado Leita, Marc Dacier |
SGNET: Implementation insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 1075-1078, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Prateek Saxena, R. Sekar 0001, Varun Puranik |
Efficient fine-grained binary instrumentationwith applications to taint-tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: Sixth International Symposium on Code Generation and Optimization (CGO 2008), April 5-9, 2008, Boston, MA, USA, pp. 74-83, 2008, ACM, 978-1-59593-978-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
binary analysis/rewriting, taint tracking, information flow |
10 | Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash 0001, Kevin Borders |
Social networks and context-aware spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, San Diego, CA, USA, November 8-12, 2008, pp. 403-412, 2008, ACM, 978-1-60558-007-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, social networks, spam, email, facebook |
10 | Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch |
Identifying and Analyzing Web Server Attacks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 151-161, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious web servers, client honeypots, Network forensics |
10 | Ejike Ofuonye, James Miller 0001 |
Resolving JavaScript Vulnerabilities in the Browser Runtime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 57-66, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Zhiqiang Lin, Xiangyu Zhang 0001 |
Deriving input syntactic structure from execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008, pp. 83-93, 2008, ACM, 978-1-59593-995-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bottom-up grammar, input lineage, top-down grammar, reverse engineering, control dependence, syntax tree |
10 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 21-38, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 39-58, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
10 | Andrew Brown 0005, Mark Ryan 0001 |
Monitoring the Execution of Third-Party Software on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 410-411, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Fabrizio Baiardi, Daniele Sgandurra |
Secure Sharing of an ICT Infrastructure through Vinci. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Resilient Networks and Services, Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, Bremen, Germany, July 1-3, 2008, Proceedings, pp. 65-78, 2008, Springer, 978-3-540-70586-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
Malicious Code Detection Architecture Inspired by Human Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 312-317, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
System Call, Malicious Code Detection |
10 | Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Tsigas |
Strategies for repeated games with subsystem takeovers: implementable by deterministic and self-stabilizing automata (extended abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomics ![In: Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, Autonomics 2008, September 23-25, 2008, Turin, Italy, pp. 37, 2008, ICST, 978-963-9799-34-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
folk-theorem, joint deviation, game theory, self-stabilization, finite-automata |
10 | Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee |
Lares: An Architecture for Secure Active Monitoring Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 233-247, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtualization, active monitoring, introspection |
10 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 21-31, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Z. Cliffe Schreuders, Christian Payne |
Reusability of Functionality-Based Application Confinement Policy Abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 206-221, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox |
10 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMTIC ![In: Wireless Networks, Information Processing and Systems, International Multi Topic Conference, IMTIC 2008, Jamshoro, Pakistan, April 11-12, 2008, Revised Selected Papers, pp. 400-411, 2008, Springer, 978-3-540-89852-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
10 | Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu |
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 97-107, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Timothy Fraser, Matthew R. Evenson, William A. Arbaugh |
VICI Virtual Machine Introspection for Cognitive Immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 87-96, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta |
Understanding implications of DNS zone provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, IMC 2008, Vouliagmeni, Greece, October 20-22, 2008, pp. 211-216, 2008, ACM, 978-1-60558-334-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
zone transfer, dns, domain name system |
10 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(9), pp. 20-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semiconductor technology, LED technology, herd computing, wireless technology, spyware |
10 | William H. Allen, Richard Ford |
How Not to Be Seen II: The Defenders Fight Back. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 65-68, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Dianne Solomon |
Balancing Privacy and Risk in the E-Messaging World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(5), pp. 72-75, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Iván Arce |
A Surprise Party (on Your Computer)? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 15-16, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Fred B. Schneider |
Trusted Computing in Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 4-5, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh |
Software Protection through Anti-Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(3), pp. 82-84, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Brandi Ortega |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 6-9, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 163-184, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vinoo Thomas, Nitin Jyoti |
Bot countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 103-111, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 4-12, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
10 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 88-103, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Ronald C. Dodge, Corey Bertram, Daniel Ragsdale |
Remote Virtual Information Assurance Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 485-490, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jason Raber, Eric Laspe |
Emulated Breakpoint Debugger and Data Mining Using Detours. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 14th Working Conference on Reverse Engineering (WCRE 2007), 28-31 October 2007, Vancouver, BC, Canada, pp. 271-272, 2007, IEEE Computer Society, 0-7695-3034-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jason Raber, Eric Laspe |
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 14th Working Conference on Reverse Engineering (WCRE 2007), 28-31 October 2007, Vancouver, BC, Canada, pp. 275-276, 2007, IEEE Computer Society, 0-7695-3034-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Raman Sharykin, Phillip A. Porras |
Applying Formal Evaluation to Worm Defense Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 479-486, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 254-258, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis |
A Probabilistic Approach to Source Code Authorship Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 243-248, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee |
An Empirical Study of Spam and Spam Vulnerable email Accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 408-413, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 198-218, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 191-202, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jesus Molina, Xavier Chorin, Michel Cukier |
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 144-155, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation |
10 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 13-27, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada, pp. 42, 2007, IEEE Computer Society, 0-7695-2837-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mohammed S. Alam, Son Thanh Vuong |
APHIDS++: A Mobile Agent Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Rui Joaquim, Carlos Ribeiro |
CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VOTE-ID ![In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers, pp. 178-188, 2007, Springer, 978-3-540-77492-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
vote manipulation, Internet voting |
10 | Martin Szydlowski, Christopher Kruegel, Engin Kirda |
Secure Input for Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 375-384, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Tracking Darkports for Network Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 161-171, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Phillip A. Porras |
Privacy-Enabled Global Threat Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(6), pp. 60-63, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sampo Töyssy, Marko Helenius |
About malicious software in smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(2), pp. 109-119, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 749, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Leon Moonen, Spiros Mancoridis |
Code Based Software Security Assessments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 13th Working Conference on Reverse Engineering (WCRE 2006), 23-27 October 2006, Benevento, Italy, pp. 313, 2006, IEEE Computer Society, 0-7695-2719-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié |
Thresholds for virus spread on networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VALUETOOLS ![In: Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, VALUETOOLS 2006, Pisa, Italy, October 11-13, 2006, pp. 51, 2006, ACM, 1-59593-504-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SIR epidemic, largest connected component, random graphs, spectral radius |
10 | Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi |
Attacking Confidentiality: An Agent Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 285-296, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Brian O'Higgins |
Deep packet inspection comes to the desktop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 6, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Phillip A. Porras, Vitaly Shmatikov |
Large-scale collection and sanitization of network security data: risks and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, pp. 57-64, 2006, ACM, 978-1-59593-923-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Amanda M. Holland-Minkley |
Cyberattacks: a lab-based introduction to computer security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 7th Conference on Information Technology Education, SIGITE 2006, Minneapolis, Minnesota, USA, October 19-21, 2006, pp. 39-46, 2006, ACM, 1-59593-521-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
laboratory coursework, computer security, IT education |
10 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 57-66, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Bharath Madhusudan, John W. Lockwood |
A Hardware-Accelerated System for Real-Time Worm Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 25(1), pp. 60-69, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 |
Anomaly Detection in Computer Security and an Application to File System Accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings, pp. 14-28, 2005, Springer, 3-540-25878-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection |
10 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 756-767, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
10 | Kevin R. B. Butler, Patrick D. McDaniel |
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 36-48, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | João Schwarz da Silva |
Challenges and opportunities in ICT: a European perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Data Management ![In: 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005, pp. 327, 2005, ACM, 1-59593-041-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
An Email Worm Vaccine Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 97-108, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Norman Feske, Christian Helmuth |
A Nitpicker's guide to a minimal-complexity secure GUI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 85-94, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Volker Roth 0002 |
Obstacles to the Adoption of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Data Management ![In: 5th IEEE International Conference on Mobile Data Management (MDM 2004), 19-22 January 2004, Berkeley, CA, USA, pp. 296-297, 2004, IEEE Computer Society, 0-7695-2070-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Mobile agents |
10 | Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
A Protocol for Reputation Management in Super-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza, Spain, pp. 979-983, 2004, IEEE Computer Society, 0-7695-2195-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Gordon W. Romney, Brady R. Stevenson |
An isolated, multi-platform network sandbox for teaching IT security system engineers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 19-23, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula |
10 | Ajay Gupta 0002, Daniel C. DuVarney |
Using Predators to Combat Worms and Viruses: A Simulation-Based Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 116-125, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Steven Furnell |
Cybercrime: Vandalizing the Information Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings, pp. 8-16, 2003, Springer, 3-540-40522-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks |
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, IFIP TC6 5th International Workshop, IWAN 2003, Kyoto, Japan, December 10-12, 2003, Revised Papers, pp. 44-57, 2003, Springer, 3-540-21250-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | George Lawton |
Virus Wars: Fewer Attacks, New Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(12), pp. 22-24, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Junming Liu, Yuntao Zhao, Yongxin Feng, Yutao Hu, Xiangyu Ma |
SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 80, pp. 103690, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto |
Enhancing android malware detection explainability through function call graph APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 80, pp. 103691, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Zhen Liu, Ruoyu Wang 0002, Nathalie Japkowicz, Heitor Murilo Gomes, Bitao Peng, Wenbin Zhang 0002 |
SeGDroid: An Android malware detection method based on sensitive function call graph learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 235, pp. 121125, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Meghna Dhalaria, Ekta Gandotra |
MalDetect: A classifier fusion approach for detection of android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 235, pp. 121155, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Shaojie Chen, Bo Lang, Hongyu Liu, Yikai Chen, Yucai Song |
Android malware detection method based on graph attention networks and deep fusion of multimodal features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 237(Part C), pp. 121617, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | L. Dhanya, R. Chitra |
A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 237(Part C), pp. 121618, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Hashida Haidros Rahima Manzil, S. Manohar Naik |
Detection approaches for android malware: Taxonomy and review analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part F), pp. 122255, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Jiyun Yang, Can Gui |
Android malware detection framework based on sensitive opcodes and deep reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(4), pp. 8933-8942, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Deepika Maddali |
Convnext-Eesnn: An effective deep learning based malware detection in edge based IIOT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(4), pp. 10405-10421, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Abdulrahman Alamer |
A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 25, pp. 101015, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu |
Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 162, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Pawan Kumar, Sukhdip Singh |
Security Testing of Android Apps Using Malware Analysis and XGboost Optimized by Adaptive Particle Swarm Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 92, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Shovana Das, Anshika Garg, Sanjay Kumar |
Stacking Ensemble-Based Approach for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 185, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Chakradhar Verma, C. P. Gupta |
Effect of Vaccination on Stability of Wireless Sensor Network Against Malware Attack: An Epidemiological Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(2), pp. 240, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu |
Correction: Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(2), pp. 261, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Jitendra Kumar, Balaji Rajendran, Sithu D. Sudarsan |
Zero-Day Malware Classification and Detection Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 93, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Sidra Siddiqui, Tamim Ahmed Khan |
An Overview of Techniques for Obfuscated Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(4), pp. 328, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | John Musgrave, Alina Campan, Temesguen Messay Kebede, David Kapp, Boyang Wang |
Search and Retrieval in Semantic-Structural Representations of Novel Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Artif. Intell. Mach. Learn. ![In: Adv. Artif. Intell. Mach. Learn. 4(1), pp. 2052-2076, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian |
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(1), pp. 271-297, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|