-
1
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant, "Semantics-aware malware detection," in IEEE Symposium on Security and Privacy (S&P'05), pp. 32-46,2005.
-
(2005)
IEEE Symposium on Security and Privacy (S&P'05)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
2
-
-
0004116989
-
-
2nd ed, Cambridge: MA: MTT Press
-
T.H. Cormen, CE. Leiserson, R.L. Rivest, and S. C., Introduction to algorithms, 2nd ed., Cambridge: MA: MTT Press, 2001.
-
(2001)
Introduction to algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
C., S.4
-
4
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
D. Dagon, T. Martin, and T. Starner, "Mobile phones as computing devices: the viruses are coming!," Pervasive Computing, IEEE, Vol. 3, pp. 11-15, 2004.
-
(2004)
Pervasive Computing, IEEE
, vol.3
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
5
-
-
0032108328
-
A threshold of Inn for approximating set cover
-
U. Feige, " A threshold of Inn for approximating set cover," Journal of the ACM, Vol. 45, pp. 634-652, 1998.
-
(1998)
Journal of the ACM
, vol.45
, pp. 634-652
-
-
Feige, U.1
-
6
-
-
0003552088
-
Automatic extraction of computer virus signatures
-
Abingdon: UK, Virus Bulletin Ltd, pp
-
J.O. Kephart and W.C. Arnold, "Automatic extraction of computer virus signatures," in Virus Bulletin International Conference, Abingdon: UK, Virus Bulletin Ltd., pp. 178-184, 1994.
-
(1994)
Virus Bulletin International Conference
, pp. 178-184
-
-
Kephart, J.O.1
Arnold, W.C.2
-
7
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection," in USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
11
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M.G. Schultz, E. Eskin, E. Zadok, and S.J. Stolfo, "Data mining methods for detection of new malicious executables," in IEEE Symposium on Security and Privacy, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
12
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in ACM/USENIX Symposium on Operating System Design and Implementation, 2004.
-
(2004)
ACM/USENIX Symposium on Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
14
-
-
0038197411
-
Issues in mobile e-commerce
-
P. Tarasewich, R.C. Nickerson, and M. Warkentin, "Issues in mobile e-commerce," Communications of the Association for Information Systems, Vol. 8, pp. 2002.
-
Communications of the Association for Information Systems
, vol.8
, pp. 2002
-
-
Tarasewich, P.1
Nickerson, R.C.2
Warkentin, M.3
-
15
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J.O. Kephart, and G.B. Sorken, "Neural networks for computer virus recognition," IEEE Expert, Vol. 11, pp. 5-6, 1996.
-
(1996)
IEEE Expert
, vol.11
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorken, G.B.3
|