-
3
-
-
27544481189
-
Comparison of feature selection and classification algorithms in identifying malicious executables
-
Submitted to
-
D. M. Cai, M. Gokhale and J. Theiler, Comparison of Feature Selection and Classification Algorithms in Identifying Malicious Executables, Submitted to Data and Knowledge Engineering 2003.
-
Data and Knowledge Engineering 2003
-
-
Cai, D.M.1
Gokhale, M.2
Theiler, J.3
-
5
-
-
27544455677
-
A cryptographic checksum for integrity protection
-
F. Cohen, A Cryptographic Checksum for Integrity Protection, Computers and Security 6 (1987) 505-510.
-
(1987)
Computers and Security
, vol.6
, pp. 505-510
-
-
Cohen, F.1
-
6
-
-
34249753618
-
Support vector network
-
C. Cortes and V. Vapnik, Support Vector Network, Machine Learning 20 (1995) 273-297.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
7
-
-
27544504233
-
A testbed for malicious code detection: A synthesis of static and dynamic analysis techniques
-
R. Crawford, R. Lo, J. Crossley, G. Fink, P. Kerchen, W. Ho, K. Levitt, R. Olsson, and M. Archer, A Testbed for Malicious Code Detection: A Synthesis of Static and Dynamic Analysis Techniques, Proceedings of the Department of Energy Computer Security Group Conference, 17, pp. 1-23, 1991.
-
(1991)
Proceedings of the Department of Energy Computer Security Group Conference
, vol.17
, pp. 1-23
-
-
Crawford, R.1
Lo, R.2
Crossley, J.3
Fink, G.4
Kerchen, P.5
Ho, W.6
Levitt, K.7
Olsson, R.8
Archer, M.9
-
9
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in Unlabeled Data
-
Edited by D. Barbará and S. Jajodia, (Kluwer Academic Publisher)
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A geometric framework for unsupervised anomaly detection: detecting intrusions in Unlabeled Data. On Application of Data Mining in Computer Security, Edited by D. Barbará and S. Jajodia, (Kluwer Academic Publisher, 2002).
-
(2002)
On Application of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
13
-
-
0026381952
-
Towards for malicious code detection
-
R. W. Lo, P. Kerchen, R. Crawford, W. Ho, J. Crossley, G. Fink, K. Levitt, R. Olsson, and M. Archer, Towards for Malicious Code Detection, IEEE Computer Society International Conference, pp. 160-166, 1991.
-
(1991)
IEEE Computer Society International Conference
, pp. 160-166
-
-
Lo, R.W.1
Kerchen, P.2
Crawford, R.3
Ho, W.4
Crossley, J.5
Fink, G.6
Levitt, K.7
Olsson, R.8
Archer, M.9
-
14
-
-
0029488806
-
MCF: A malicious code filter
-
R. W. Lo, Karl N. Levvit, and Ronald A. Olsson, MCF: A Malicious Code Filter, Computers & Security, 14, pp. 541-566, 1995.
-
(1995)
Computers & Security
, vol.14
, pp. 541-566
-
-
Lo, R.W.1
Levvit, K.N.2
Olsson, R.A.3
-
16
-
-
0005910615
-
A validation index for artificial neural network
-
S. Roberts, L. Tarassenko, J. Pardey, and D. Siegwart, A validation index for artificial neural network, In Proceedings of Int. Conference on Neural Networks and Expert System in Medicine and Healthcare, pp. 23-30, 1994.
-
(1994)
Proceedings of Int. Conference on Neural Networks and Expert System in Medicine and Healthcare
, pp. 23-30
-
-
Roberts, S.1
Tarassenko, L.2
Pardey, J.3
Siegwart, D.4
-
17
-
-
0000487102
-
Estimating the support of high-dimensional distribution
-
B. Schölkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, Estimating the support of high-dimensional distribution, Neural Computation (13), pp. 1443-1471, 2001.
-
(2001)
Neural Computation
, Issue.13
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
18
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, Data Mining Methods for Detection of New Malicious Executables, Proceedings of IEEE Symposium on Security and Privacy. Oakland, pp.38-49, 2001.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
19
-
-
15944375379
-
Malicious email filter - A UNIX mail filter that detects malicious windows executables
-
Boston, MA: June
-
M. G. Schultz, E. Eskin, and S. J. Stolfo, Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables, Proceedings of USENIX Annual Technical Conference - FREENIX Track. Boston, MA: June, 2001.
-
(2001)
Proceedings of USENIX Annual Technical Conference - FREENIX Track
-
-
Schultz, M.G.1
Eskin, E.2
Stolfo, S.J.3
-
20
-
-
0001986205
-
Data domain description by support vectors
-
M. Vefieysen, Ed., Brussels, D. Facto Press
-
D. Tax and R. Duin, Data domain description by support vectors, in Proc. ESANN, M. Vefieysen, Ed., Brussels, pp. 251-256, D. Facto Press, 1999.
-
(1999)
Proc. ESANN
, pp. 251-256
-
-
Tax, D.1
Duin, R.2
-
23
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J. O. Kephart, and G. B. Sorkin, Neural Networks for Computer Virus Recognition, IEEE Expert, 11 (1996) 5-6.
-
(1996)
IEEE Expert
, vol.11
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorkin, G.B.3
|