-
1
-
-
57749194510
-
-
Gryaznov, D. Scanners of the Year 2000: Heuristics. In: Proceedings of the 5th Virus Bulletin International Conference, Boston, Massachusetts, 1999. 225-234
-
Gryaznov, D. Scanners of the Year 2000: Heuristics. In: Proceedings of the 5th Virus Bulletin International Conference, Boston, Massachusetts, 1999. 225-234
-
-
-
-
2
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
Oakland, California
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J. Data Mining Methods for Detection of New Malicious Executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, 2001. 38-49
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
3
-
-
15944375379
-
Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables
-
Boston, Massechusetts
-
Schultz, M.G., Eskin, E., Zadok, E., Bhattacharyya, M., Stolfo, S.J. MEF: Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables. In: Proceedings of the Annual USENIX Technical Conference, FREENIX Track, Boston, Massechusetts. 2001. 245-252
-
(2001)
Proceedings of the Annual USENIX Technical Conference, FREENIX Track
, pp. 245-252
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Bhattacharyya, M.4
Stolfo, S.J.M.5
-
4
-
-
57749209767
-
Neural networks for computer virus detection
-
Siam, M., Hashem. M., Arafat, S. etc. Neural networks for computer virus detection. WSEAS Transactions on Systems, 2003, 2(3): 598-605
-
(2003)
WSEAS Transactions on Systems
, vol.2
, Issue.3
, pp. 598-605
-
-
Siam, M.1
Hashem, M.2
Arafat, S.3
-
5
-
-
33744948585
-
Yin jiangping, Hao Jinbo. etc. Unknown computer virus detection based on multi-naive Bayes algorithm
-
Zhang Baoyun, Yin jiangping, Hao Jinbo. etc. Unknown computer virus detection based on multi-naive Bayes algorithm Computer Engineering, 2006, 32(10): 18-21
-
(2006)
Computer Engineering
, vol.32
, Issue.10
, pp. 18-21
-
-
Zhang, B.1
-
6
-
-
33744818877
-
-
Li Tao, Liu xiaojie, Li hongbin, An immune-based model for computer virus detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 3810 LNCS, Cryptology and Network Security - 4th International Conference, CANS 2005, 2005. 59-71
-
Li Tao, Liu xiaojie, Li hongbin, An immune-based model for computer virus detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 3810 LNCS, Cryptology and Network Security - 4th International Conference, CANS 2005, 2005. 59-71
-
-
-
-
7
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter, J.Z., and Maloof, M.A. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research. 2006, 7:2721-2744
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
8
-
-
57749186558
-
-
Kephart, J.O., Arnold, W.C. Automatic Extraction of Computer Virus Signatures. In: Proceedings of the 4th Virus Bulletin International Conference, Abingdon, England, 1994. 178-184
-
Kephart, J.O., Arnold, W.C. Automatic Extraction of Computer Virus Signatures. In: Proceedings of the 4th Virus Bulletin International Conference, Abingdon, England, 1994. 178-184
-
-
-
-
9
-
-
33646822481
-
-
Dash, S.K., Reddy, K.S., Pujari, A.K. Episode based masquerade detection. In proceedings of 1st international conference on information systems security, Kolkata, 2005, 3803:251-262
-
Dash, S.K., Reddy, K.S., Pujari, A.K. Episode based masquerade detection. In proceedings of 1st international conference on information systems security, Kolkata, 2005, 3803:251-262
-
-
-
-
10
-
-
33745486745
-
Multiresolution abnormal trace detection using varied-length N- grams and automata
-
Jiang, G., Chen, FL, Ungureanu, C., Yoshihira, K. Multiresolution abnormal trace detection using varied-length N- grams and automata. In proceedings of the 2nd international conference on autonomic computing, 2005
-
(2005)
proceedings of the 2nd international conference on autonomic computing
-
-
Jiang, G.1
Chen, F.L.2
Ungureanu, C.3
Yoshihira, K.4
-
12
-
-
0006291183
-
A study using n-gram features for text categorization
-
Technical report OEFAI-TR-9830, Austrian research institute for artificial intelligence
-
Furnkranz, J. A study using n-gram features for text categorization. Technical report OEFAI-TR-9830, Austrian research institute for artificial intelligence, 1998
-
(1998)
-
-
Furnkranz, J.1
-
13
-
-
57749204679
-
New malicious code detecting using variable length n-grams
-
Reddy, D.S., Dash, S.K., Pujari, A.K., New malicious code detecting using variable length n-grams. In: Proceedings of ICISS. 2006. 276-288
-
(2006)
Proceedings of ICISS
, pp. 276-288
-
-
Reddy, D.S.1
Dash, S.K.2
Pujari, A.K.3
-
14
-
-
33746864380
-
Detection of new malicious code using N-grams signatures
-
Assaleh, T.A., Cercone, N., Keselj, V., Sweidan, R. Detection of new malicious code using N-grams signatures. In proceedings of the 2nd annual conference on privacy, security and trust. 2004. 193-196
-
(2004)
proceedings of the 2nd annual conference on privacy, security and trust
, pp. 193-196
-
-
Assaleh, T.A.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
16
-
-
57749172615
-
Study on SVM learning algorithm Based on Hull vector [D]
-
Zhejiang University
-
LI Donghui. Study on SVM learning algorithm Based on Hull vector [D]. Zhejiang: Zhejiang University, 2006.
-
(2006)
Zhejiang
-
-
Donghui, L.I.1
-
17
-
-
57749204679
-
New malicious code detecting using variable length n-grams
-
Reddy, D.S., Dash, S.K., Pujari, A.K.: New malicious code detecting using variable length n-grams. In: Proceedings of ICISS. 2006. 276-288,
-
(2006)
Proceedings of ICISS
, pp. 276-288
-
-
Reddy, D.S.1
Dash, S.K.2
Pujari, A.K.3
-
18
-
-
57749171667
-
-
Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Proceedings of the 2000 Virus Bulletin International Conference, Orlando, Florida, 2000
-
Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection. In: Proceedings of the 2000 Virus Bulletin International Conference, Orlando, Florida, 2000
-
-
-
-
19
-
-
0030216542
-
Neural networks for computer virus recognition
-
August
-
Tesauro, G., J.O. Kephart and G.B. Sorkin. Neural networks for computer virus recognition. IEEE Expert, August 1996, 11(4):5-6,
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorkin, G.B.3
|