메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Code graph for malware detection

Author keywords

[No Author keywords available]

Indexed keywords

CODES (STANDARDS); CODES (SYMBOLS); COMPUTER CRIME; COMPUTER SOFTWARE; IMAGE SEGMENTATION; MECHANISMS; TOPOLOGY;

EID: 49749108277     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICOIN.2008.4472801     Document Type: Conference Paper
Times cited : (17)

References (8)
  • 1
    • 49749086916 scopus 로고    scopus 로고
    • Arbor Networks. Worldwide ISP Security Report, 2005.
    • Arbor Networks. "Worldwide ISP Security Report," 2005.
  • 3
    • 85000701895 scopus 로고    scopus 로고
    • My Botnet is Bigger than Yours (Maybe, Better than Yours) : Why Size Estimates Remain Challenging
    • Apr
    • Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis. "My Botnet is Bigger than Yours (Maybe, Better than Yours) : Why Size Estimates Remain Challenging," Proc. of HotBots, Apr. 2007.
    • (2007) Proc. of HotBots
    • Abu Rajab, M.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 5
    • 34547464948 scopus 로고    scopus 로고
    • Malware normalization,
    • Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, November
    • M. Christodorescu, J. Kinder. S. Jha, S. Katzenbeisser, "Malware normalization," Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, November 2005.
    • (2005)
    • Christodorescu, M.1    Kinder, J.2    Jha, S.3    Katzenbeisser, S.4
  • 6
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations,
    • Technical Report 148, Department of Computer Science, University of Auckland. New Zealand, July
    • C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report 148, Department of Computer Science, University of Auckland. New Zealand, July 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.