-
4
-
-
2342513049
-
Automated assistance for detecting Malicious Code
-
R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, M. Casillas, Automated assistance for detecting Malicious Code, in: Proceedings of the 6th International Computer Virus and Security Conference, 1993
-
(1993)
Proceedings of the 6th International Computer Virus and Security Conference
-
-
Crawford, R.1
Kerchen, P.2
Levitt, K.3
Olsson, R.4
Archer, M.5
Casillas, M.6
-
5
-
-
85008010113
-
Melissa virus creates a new type of threat
-
L. Garber Melissa virus creates a new type of threat Computer 32 6 1999 16 19 < http://www.av.ibm.com/ScientificPapers/White/Anatomy/anatomy.html >
-
(1999)
Computer
, vol.32
, Issue.6
, pp. 16-19
-
-
Garber, L.1
-
9
-
-
0003521691
-
Static analysis virus detection tools for UNIX systems
-
P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, R. Olsson, Static analysis virus detection tools for UNIX systems, in: Proceedings of the 13th National Computer Security Conference, 1990, pp. 350-365
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 350-365
-
-
Kerchen, P.1
Lo, R.2
Crossley, J.3
Elkinbard, G.4
Olsson, R.5
-
10
-
-
0031377267
-
A generic virus detection agent on the Internet, System sciences
-
J.S. Lee, J. Hsiang, P.H. Tsang, A generic virus detection agent on the Internet, System sciences, in: Proceedings of the Thirtieth Hawaii International Conference on, vol. 4, 1997, pp. 210-219
-
(1997)
Proceedings of the Thirtieth Hawaii International Conference on
, vol.4
, pp. 210-219
-
-
Lee, J.S.1
Hsiang, J.2
Tsang, P.H.3
-
11
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, K. Mok, A data mining framework for building intrusion detection models, in: IEEE Symposium on Security and Privacy, 1999, pp. 120-132
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
14
-
-
0034269416
-
Attacking malicious code: Report to the Infosec Research Council
-
G. McGraw, and G. Morrisett Attacking malicious code: Report to the Infosec Research Council IEEE Software 17 5 2000 33 41
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
17
-
-
0036891022
-
An analysis of a model of computer viruses spreading via electronic mail
-
T. Okamoto, and Y. Ishida An analysis of a model of computer viruses spreading via electronic mail Systems and Computers in Japan 33 14 2002 81 90
-
(2002)
Systems and Computers in Japan
, vol.33
, Issue.14
, pp. 81-90
-
-
Okamoto, T.1
Ishida, Y.2
-
18
-
-
0242624600
-
MET: An experimental system for malicious email tracking
-
Virginia Beach, VA, 23-26 September
-
M.G. Schultz, E. Eskin, S. Hershkop, S.J. Stolfo, MET: An experimental system for malicious email tracking, in: Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002), Virginia Beach, VA, 23-26 September 2002, pp. 1-12
-
(2002)
Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002)
, pp. 1-12
-
-
Schultz, M.G.1
Eskin, E.2
Hershkop, S.3
Stolfo, S.J.4
-
19
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland, CA, 14-17 May
-
M.G. Schultz, E. Eskin, S. Hershkop, S.J. Stolfo, Data mining methods for detection of new malicious executables, in: Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P-2001), Oakland, CA, 14-17 May 2001
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P-2001)
-
-
Schultz, M.G.1
Eskin, E.2
Hershkop, S.3
Stolfo, S.J.4
-
20
-
-
0003545819
-
The Internet worm program: An analysis
-
Department of Computer Science, Purdue University
-
E.H. Spafford, The Internet worm program: an analysis, Tech. Report CSD-TR-823, Department of Computer Science, Purdue University, 1988
-
(1988)
Tech. Report
, vol.CSD-TR-823
-
-
Spafford, E.H.1
-
21
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J.O. Kephart, and G.B. Sorkin Neural networks for computer virus recognition IEEE Expert 11 4 1996 5 6
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorkin, G.B.3
-
22
-
-
84944063883
-
-
Trend Micro. < http://www.trend.com.tw/endusers/products/pcc2000.html >
-
Trend Micro.
-
-
-
23
-
-
18144379668
-
Understanding Heuristics: Symatec's bloodhound technology
-
Understanding Heuristics: Symatec's Bloodhound Technology, Symatec White Paper Series, Vo1. XXXIV
-
Symatec White Paper Series
, vol.34
-
-
-
24
-
-
0003552090
-
Anatomy of a commercial-grade immune system
-
S.R. White, M. Swimmer, E.J. Pring, W.C. Arnold, D.M. Chess, J.F. Morar, Anatomy of a Commercial-Grade Immune System, IBM Research White Paper, 1999
-
(1999)
IBM Research White Paper
-
-
White, S.R.1
Swimmer, M.2
Pring, E.J.3
Arnold, W.C.4
Chess, D.M.5
Morar, J.F.6
-
25
-
-
18144391324
-
-
Publications of Mississippi State University, Institute for Signal and Information Processing
-
Y.F. Wu, Learning with Bayesian networks, Publications of Mississippi State University, Institute for Signal and Information Processing, 1999
-
(1999)
Learning with Bayesian Networks
-
-
Wu, Y.F.1
-
26
-
-
9444275837
-
Probabilistic networks with undirected links for anomaly detection, Workshop on information assurance and security
-
N. Ye, M. Xu, and S.M. Emran Probabilistic networks with undirected links for anomaly detection, Workshop on information assurance and security Proceedings of the IEEE 2000 175 179
-
(2000)
Proceedings of the IEEE
, pp. 175-179
-
-
Ye, N.1
Xu, M.2
Emran, S.M.3
-
27
-
-
0034949027
-
Fighting against the invisible enemy
-
D. Zenkin Fighting against the invisible enemy Computers & Security 20 2001 316 321
-
(2001)
Computers & Security
, vol.20
, pp. 316-321
-
-
Zenkin, D.1
|