-
1
-
-
12244311689
-
A taxonomy of computer worms
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms", First Workshop on Rapid Malcode (WORM), 2003, pp. 11-18.
-
(2003)
First Workshop on Rapid Malcode (WORM)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
2
-
-
21644473703
-
-
Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census House Government Reform Committee, September 10
-
G. Eschelbeck, "Worm and Virus Defense: How Can We Protect the Nation's Computers From These Threats?", Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census House Government Reform Committee, September 10, 2003.
-
(2003)
Worm and Virus Defense: How Can We Protect the Nation's Computers from These Threats?
-
-
Eschelbeck, G.1
-
3
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen, "Computer viruses: Theory and experiments", Computers and Security, Vol. 6, 1987, pp. 22-35.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
5
-
-
84860833874
-
Static analysis of binary code to isolate malicious behaviors
-
Stanford University, California, USA, IEEE Press
-
th International Workshops on Enterprise Security (WETICE'99), Stanford University, California, USA, 1999, IEEE Press.
-
(1999)
th International Workshops on Enterprise Security (WETICE'99)
-
-
Bergeron, J.1
Debbabi, M.2
Erhioui, M.M.3
Ktari, B.4
-
6
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", Usenix Security Symposium, 2003, pp. 169-186.
-
(2003)
Usenix Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
7
-
-
84860961653
-
-
Symantec Cooperation http://securityresponse.symantec.com/avcenter/.
-
-
-
-
8
-
-
84860961691
-
-
Virus Library http://www.viruslibrary.com/virusinfo/Win32.Bika.htm.
-
-
-
-
9
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection", IEEE Transactions on Software Engineering Vol. 28:8,2002, pp. 735-746.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg1
Thomborson, C.2
-
10
-
-
84949509764
-
Experience with software watermarking
-
S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang, "Experience with software watermarking", In the Proceedings of 16th Annual Computer Security Applications Conference (ACSAC'00), 2000, pp.308-316.
-
(2000)
Proceedings of 16th Annual Computer Security Applications Conference (ACSAC'00)
, pp. 308-316
-
-
Krishnaswamy, S.1
Kwon, M.2
Ma, D.3
Shao, Q.4
Zhang, Y.5
-
11
-
-
84860959972
-
-
Hackman Hex editor, http://www.technologismiki.com/en/index-h.html.
-
-
-
Hex, H.1
-
12
-
-
0031755126
-
Activity pattern analysis by means of sequence-alignment methods
-
W.C. Wilson, "Activity Pattern Analysis by means of Sequence-Alignment Methods", Journal of Environment and planning, Vol. 30, 1998, pp. 1017-1038.
-
(1998)
Journal of Environment and Planning
, vol.30
, pp. 1017-1038
-
-
Wilson, W.C.1
|