-
1
-
-
33746864380
-
Detection of new malicious code using n-grams signatures
-
Fredericton, NB, Canada
-
Abou-Assaleh T, Gereone N, Kešelj V, Sweidan R (2004) Detection of new malicious code using n-grams signatures. In: Second annual conference on privacy, security and trust. Fredericton, NB, Canada, pp 193-196
-
(2004)
Second Annual Conference on Privacy, Security and Trust
, pp. 193-196
-
-
Abou-Assaleh, T.1
Gereone, N.2
Kešelj, V.3
Sweidan, R.4
-
2
-
-
2342498943
-
Technical and human issues in computerbased systems security
-
School of Computing Science, University of Newcastle-upon-Tyme
-
Arief B, Besnard D (2003) Technical and human issues in computerbased systems security. Tech. Rep. CS-TR-790, School of Computing Science, University of Newcastle-upon-Tyme
-
(2003)
Tech. Rep.
, vol.CS-TR-790
-
-
Arief, B.1
Besnard, D.2
-
4
-
-
0039528117
-
A program for identifying duplicated code
-
Baker BS (1992) A program for identifying duplicated code. Comput Sci Stat 24:49-57
-
(1992)
Comput Sci Stat
, vol.24
, pp. 49-57
-
-
Baker, B.S.1
-
7
-
-
17444408640
-
Macro and script virus polymorphism
-
Virus Bulletin, Ltd., New Orleans, LA
-
Bontchev V, Tocheva K (2002) Macro and script virus polymorphism. In: Proceedings of the twelfth international virus bulletin conference, Virus Bulletin, Ltd., New Orleans, LA pp 406-438
-
(2002)
Proceedings of the Twelfth International Virus Bulletin Conference
, pp. 406-438
-
-
Bontchev, V.1
Tocheva, K.2
-
8
-
-
33746903440
-
Anti-virus spamming and the virus-naming mess: Part 2
-
Bontchev V (2004) Anti-virus spamming and the virus-naming mess: Part 2. Virus Bull pp 13-15
-
(2004)
Virus Bull
, pp. 13-15
-
-
Bontchev, V.1
-
11
-
-
1442352376
-
Growth, evolution, and structural change in open source software
-
Vienna, Austria ACM Press
-
Godfrey M, Tu Q (2001) Growth, evolution, and structural change in open source software. In: Proceedings of the 4th international workshop on principles of software evolution, Vienna, Austria ACM Press, pp 103-106
-
(2001)
Proceedings of the 4th International Workshop on Principles of Software Evolution
, pp. 103-106
-
-
Godfrey, M.1
Tu, Q.2
-
13
-
-
33746877417
-
Dealing with metamorphism
-
Jordan M (2002) Dealing with metamorphism. Virus Bulletin pp 4-6
-
(2002)
Virus Bulletin
, pp. 4-6
-
-
Jordan, M.1
-
14
-
-
0038163983
-
CLUTO: A clustering toolkit, release 2.1.1
-
Department of Computer Science, University of Minnesota, Minneapolis, MN 55455, November 2003
-
Karypis G (2003) CLUTO: A clustering toolkit, release 2.1.1, Tech. Rep. #02-017, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455, November 2003
-
(2003)
Tech. Rep. #02-017
, vol.2
, Issue.17
-
-
Karypis, G.1
-
15
-
-
0002606747
-
A biologically inspired immune system for computers
-
Brooks RA, Maes P, (eds.), MIT Press, Cambridge, MA
-
Kephart JO (1994) A biologically inspired immune system for computers. In: Brooks RA, Maes P, (eds.), Artificial Life IV: Proceedings of the fourth international workshop on synthesis and simulation of living systems MIT Press, Cambridge, MA, pp 130-139
-
(1994)
Artificial Life IV: Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems
, pp. 130-139
-
-
Kephart, J.O.1
-
16
-
-
0037700468
-
Biologically inspired defenses against computer viruses
-
Morgan Kaufman, Montreal, PQ
-
Kephart JO, Sorkin GB, Arnold WC, Chess DM, Tesauro GJ, White SR (1995) Biologically inspired defenses against computer viruses. In: Proceedings of the 14th international joint conference on artificial intelligence (IJCAI'95), Morgan Kaufman, Montreal, PQ, pp 985-996
-
(1995)
Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI'95)
, pp. 985-996
-
-
Kephart, J.O.1
Sorkin, G.B.2
Arnold, W.C.3
Chess, D.M.4
Tesauro, G.J.5
White, S.R.6
-
18
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
Kim W, Kohavi R, Gehrke J, DuMouchel W, (eds.), ACM, Seattle, WA
-
Kolter JZ, Maloof MA (2004) Learning to detect malicious executables in the wild. In: Kim W, Kohavi R, Gehrke J, DuMouchel W, (eds.), Proceedings of the Tenth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, Seattle, WA, pp 470-478
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 470-478
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
23
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland, CA, IEEE Computer Society Press
-
Schultz MG, Eskin E, Zadok E, Stolfo SJ (2001) Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE symposium on security and privacy, Oakland, CA, IEEE Computer Society Press, pp 38-49
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
25
-
-
0030216542
-
Neural networks for computer virus recognition
-
Tesauro G, Kephart JO, Sorkin GB (1996) Neural networks for computer virus recognition. IEEE Expert 11(4):5-6
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorkin, G.B.3
-
26
-
-
84976728067
-
The string-to-string correction problem with block moves
-
Tichy WF (1984) The string-to-string correction problem with block moves. ACM Trans Comput Syst 2(4):309-321
-
(1984)
ACM Trans Comput Syst
, vol.2
, Issue.4
, pp. 309-321
-
-
Tichy, W.F.1
-
27
-
-
33746898520
-
-
VX heavens (2005) Available from vx.netlux.org (and mirrors), Last retrieved 5 March
-
VX heavens (2005) Available from vx.netlux.org (and mirrors), Last retrieved 5 March
-
-
-
-
29
-
-
0002848777
-
Exploring the similarity space
-
Zobel J, Moffat A (1998) Exploring the similarity space. SIGIR Forum 32(1):18-34
-
(1998)
SIGIR Forum
, vol.32
, Issue.1
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
|