-
1
-
-
57349142190
-
-
Rootkitrevealer 1.71. http://technet.microsoft.com/enus/sysinternals/ bb897445.aspx.
-
Rootkitrevealer 1.71. http://technet.microsoft.com/enus/sysinternals/ bb897445.aspx.
-
-
-
-
3
-
-
0026953373
-
The esterel synchronous programming language: Design, semantics, implementation
-
G. Berry and G. Gonthier. The esterel synchronous programming language: Design, semantics, implementation. Science of Computer Programming, 19(2):87-152, 1992.
-
(1992)
Science of Computer Programming
, vol.19
, Issue.2
, pp. 87-152
-
-
Berry, G.1
Gonthier, G.2
-
4
-
-
50049087364
-
On mobile viruses exploiting messaging and Bluetooth services
-
A. Bose and K. G. Shin. On mobile viruses exploiting messaging and Bluetooth services. Secure Comm, 2006.
-
(2006)
Secure Comm
-
-
Bose, A.1
Shin, K.G.2
-
7
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
New York, NY, USA, ACM
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu. Smartsiren: virus detection and alert for smartphones. In Mohi Sys'07: Proceedings of the 5th international conference on Mobile systems, applications and sendces, pages 258-271, New York, NY, USA, 2007. ACM.
-
(2007)
Mohi Sys'07: Proceedings of the 5th international conference on Mobile systems, applications and sendces
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
10
-
-
57349103430
-
-
S. Corp. Symantec internet security threat report trends. http://www.symantec.com/business/theme.jsp?themeid=threatreport.
-
S. Corp. Symantec internet security threat report trends. http://www.symantec.com/business/theme.jsp?themeid=threatreport.
-
-
-
-
11
-
-
57349136916
-
-
K. Corporation. Kaspersky Anti-Virus Mobile. http://usa.kaspersky. com/products-services/antivirusmobile.php.
-
K. Corporation". Kaspersky Anti-Virus Mobile. http://usa.kaspersky. com/products-services/antivirusmobile.php.
-
-
-
-
12
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
13
-
-
14944379887
-
A behavioral approach to worm detection
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A behavioral approach to worm detection. In ACM Workshop on Rapid malcode (WORM), pages 43-53, 2004.
-
(2004)
ACM Workshop on Rapid malcode (WORM)
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
15
-
-
57349144092
-
-
F-secure. Cabir. http://www.f-secure.com/v-descs/cabir.shtml.
-
F-secure. Cabir
-
-
-
16
-
-
57349085352
-
-
F-secure. Lasco. http://www.f-secure.com/v-descs/lasco-a.shtml.
-
F-secure. Lasco
-
-
-
20
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
New York, NY, USA, ACM
-
C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes. Can you infect me now?: malware propagation in mobile phone networks. In WORM'07: Proceedings of the 2007 ACM workshop on Recurring malcode, pages 61-68, New York, NY, USA, 2007. ACM.
-
(2007)
WORM'07: Proceedings of the 2007 ACM workshop on Recurring malcode
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
21
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. IEEE Symposium on Security and Privacy, 120, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, vol.120
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
23
-
-
1642375563
-
Adaptive model generation:: An architecture for the deployment of data minig-based intrusion detection systems
-
A. Honig, A. Howard, E. Eskin, and S. Stolfo. Adaptive model generation:: An architecture for the deployment of data minig-based intrusion detection systems. Data Mining for Security Applications, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Honig, A.1
Howard, A.2
Eskin, E.3
Stolfo, S.4
-
25
-
-
57349108350
-
-
T. M. Incorporated. Trend Micro mobile security. http://www.trendmicro. com/en/products/mobile/tmms/, 2006.
-
T. M. Incorporated. Trend Micro mobile security. http://www.trendmicro. com/en/products/mobile/tmms/, 2006.
-
-
-
-
26
-
-
0002714543
-
Making large-scale support vector machine learning practical
-
B. Scholkopf, C. Burges, and A. Smola, editors, MIT Press, Cambridge, MA
-
T. Joachims. Making large-scale support vector machine learning practical. In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge, MA, 1998.
-
(1998)
Advances in Kernel Methods: Support Vector Machines
-
-
Joachims, T.1
-
27
-
-
57349185287
-
-
Y Kaplan. Api spying techniques for windows 9x, nt and 2000. http://www.internals.com/articles/apispy/apispy.htm.
-
Y Kaplan. Api spying techniques for windows 9x, nt and 2000. http://www.internals.com/articles/apispy/apispy.htm.
-
-
-
-
29
-
-
34548853976
-
The wireless epidemic
-
September
-
J. Kleinberg. The wireless epidemic. Nature, 449(20):287-288, September 2007.
-
(2007)
Nature
, vol.449
, Issue.20
, pp. 287-288
-
-
Kleinberg, J.1
-
30
-
-
57349145977
-
-
Mobile malware
-
K. Lab. Kaspersky security bulletin 2006: Mobile malware. http://www.viruslist.com/en/analysis?pubid=204791922.
-
(2006)
Kaspersky security bulletin
-
-
Lab, K.1
-
33
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-565, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
34
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant. Semantics-aware malware detection. In Proceedings of the IEEE Symposium on Security and Privacy, 2005.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
36
-
-
33750334282
-
Testing and evaluating virus detectors for handheld devices
-
November
-
J. A. Morales, P. J. Clarke, Y. Deng, and B. M. G. Kibria. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2):135-147, November 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 135-147
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Kibria, B.M.G.4
-
37
-
-
0036085392
-
Intrusion detection using neural networks and support veetormachines
-
S. Mukkamala, G. Janoski, and A. Sung. Intrusion detection using neural networks and support veetormachines. Intl. Joint Conf. on Neural Networks, 2002, 2, 2002.
-
(2002)
Intl. Joint Conf. on Neural Networks, 2002
, pp. 2
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
38
-
-
19044368297
-
Temporal logic of causal knowledge
-
W. Penczek. Temporal logic of causal knowledge. Proc. of WoLLiC, 98, 1998.
-
(1998)
Proc. of WoLLiC
, vol.98
-
-
Penczek, W.1
-
40
-
-
0003408420
-
-
MIT Press, Cambridge, MA, USA
-
B. Scholkopf and A. J. Smola. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge, MA, USA, 2001.
-
(2001)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
-
-
Scholkopf, B.1
Smola, A.J.2
-
41
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Washington, DC, USA, IEEE Computer Society
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In SP'01: Proceedings of the 2001 IEEE Symposium on Security and Privacy, page 144, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
SP'01: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 144
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
42
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
New York, NY, USA, ACM
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In SOSP'07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pages 335-350, New York, NY, USA, 2007. ACM.
-
(2007)
SOSP'07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
46
-
-
38149001240
-
-
T. Lee and J.J. Mody. Behavioral classification. http://www.microsoft. com/downloads/details.aspx?FamilyID=7b5d8cc8-b336-4091 -abb5-2cc500a6c41 a&displaylang=en, 2006.
-
(2006)
Behavioral classification
-
-
Lee, T.1
Mody, J.J.2
-
53
-
-
34748827408
-
-
G. Yan, H. D. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu. Bluetooth worm propagation: mobility pattern matters! In Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007.
-
(2007)
Bluetooth worm propagation: Mobility pattern matters! In Proceedings of the 2nd ACM symposium on Information, computer and communications security
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
54
-
-
28044469549
-
The monitoring and early detection of Internet worms
-
C. C. Zou, W. Gong, D. Towsley, and L. Gao. The monitoring and early detection of Internet worms. IEEE/ACM Transactions on Networking, 13(5):961-974, 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
|