-
1
-
-
84868374585
-
-
Lindon, UT
-
AccessData Inc. (2005) Forensic Toolkit, Lindon, UT.
-
(2005)
Forensic Toolkit
-
-
-
2
-
-
65149100972
-
TTAnalyze: a tool for analyzing malware
-
Hamburg, Germany, April
-
Bayer, U., Kruegel, C. and Kirda, E. (2006) ‘TTAnalyze: a tool for analyzing malware’, Proceedings of the 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), Hamburg, Germany, April.
-
(2006)
Proceedings of the 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR)
-
-
Bayer, U.1
Kruegel, C.2
Kirda, E.3
-
4
-
-
33746405183
-
A fast static analysis approach to detect exploit code inside network flows
-
Seattle, WA, September
-
Chinchani, R. and Berg, E.V.D. (2005) ‘A fast static analysis approach to detect exploit code inside network flows’, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Seattle, WA, September.
-
(2005)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Chinchani, R.1
Berg, E.V.D.2
-
5
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Washington, DC, August
-
Christodorescu, M. and Jha, S. (2003) ‘Static analysis of executables to detect malicious patterns’, Proceedings of the 12th USENIX Security Symposium, Washington, DC, August, pp.169–186.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
8
-
-
84865225731
-
-
Irvine, CA
-
Computer Economics Inc. (2007) 2007 Malware Report: The Economic Impact of Viruses, Spyware, Adware, Botnets, and Other Malicious Code, Irvine, CA.
-
(2007)
2007 Malware Report: The Economic Impact of Viruses, Spyware, Adware, Botnets, and Other Malicious Code
-
-
-
9
-
-
40949118328
-
-
Georgetown University, Washington, DC, March
-
Connor-Linton, J. (2003) Chi Square Tutorial, Georgetown University, Washington, DC, March.
-
(2003)
Chi Square Tutorial
-
-
Connor-Linton, J.1
-
11
-
-
84950306205
-
-
Moscow, Russia, v.1.51, October
-
Elcomsoft Co. Ltd. (2004) Advance Disk Catalog, Moscow, Russia, v.1.51, October.
-
(2004)
Advance Disk Catalog
-
-
-
12
-
-
84950304522
-
AV is alive and well
-
Abingdon, UK, September
-
Emm, D. (2007) ‘AV is alive and well’, Virus Bulletin, Abingdon, UK, September, p.2.
-
(2007)
Virus Bulletin
, pp. 2
-
-
Emm, D.1
-
14
-
-
34249847782
-
Formalization and implementation aspects of K-ary (malicious) codes
-
Paris, France
-
Filiol, E. (2007) ‘Formalization and implementation aspects of K-ary (malicious) codes’, Journal in Computer Virology, Vol. 3, No. 2, Paris, France.
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.2
-
-
Filiol, E.1
-
15
-
-
33746896615
-
Open problems in computer virology
-
Paris, France
-
Filiol, E., Helenius, M. and Zanero, S. (2006) ‘Open problems in computer virology’, Journal in Computer Virology, Vol. 1, Nos. 3/4, Paris, France, pp.55–66.
-
(2006)
Journal in Computer Virology
, vol.1
, Issue.3-4
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
16
-
-
35348983800
-
Compare, port, navigate
-
Amsterdam, Holland, March
-
Flake, H. (2005) ‘Compare, port, navigate’, Black Hat Europe 2005 Briefings and Training, Amsterdam, Holland, March.
-
(2005)
Black Hat Europe 2005 Briefings and Training
-
-
Flake, H.1
-
17
-
-
26444603940
-
The church-turing thesis: breaking the myth
-
Berlin, Germany
-
Goldin, D. and Wegner, P. (2005) ‘The church-turing thesis: breaking the myth’, Lecture Notes in Computer Science, Vol. 3526, Berlin, Germany, pp.152–168.
-
(2005)
Lecture Notes in Computer Science
, vol.3526
, pp. 152-168
-
-
Goldin, D.1
Wegner, P.2
-
19
-
-
0002547839
-
The analysis of residuals in cross-classified tables
-
Haberman, S. (1973) ‘The analysis of residuals in cross-classified tables’, Biometrics, Vol. 29, No. 1, pp.205–220.
-
(1973)
Biometrics
, vol.29
, Issue.1
, pp. 205-220
-
-
Haberman, S.1
-
22
-
-
33745861645
-
Multiple hypothesis testing in large-scale contingency tables: inferring pair-wise amino acid patterns in b-sheets
-
Kim, S., Tsui, K. and Borodovsky, M. (2006) ‘Multiple hypothesis testing in large-scale contingency tables: inferring pair-wise amino acid patterns in b-sheets’, Journal of Bioinformatics Research and Applications, Vol. 2, No. 2, pp.193–217.
-
(2006)
Journal of Bioinformatics Research and Applications
, vol.2
, Issue.2
, pp. 193-217
-
-
Kim, S.1
Tsui, K.2
Borodovsky, M.3
-
23
-
-
84950303782
-
-
Universität Dortmund Fachschaft Informatik, Diplomarbeit (unpublished), Dortmund, Germany, February
-
Kraus, J. (1980) Selbstreproduktion bei Programmen, Universität Dortmund Fachschaft Informatik, Diplomarbeit (unpublished), Dortmund, Germany, February, pp.72–94.
-
(1980)
Selbstreproduktion bei Programmen
, pp. 72-94
-
-
Kraus, J.1
-
24
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Seattle, WA, September
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W. and Vigna, G. (2005) ‘Polymorphic worm detection using structural information of executables’, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Seattle, WA, September.
-
(2005)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
25
-
-
33745456200
-
Fileprints: identifying file types by n-gram analysis
-
USMA West Point, NY, June
-
Li, W., Wang, K., Stolfo, S. and Herzog, B. (2005) ‘Fileprints: identifying file types by n-gram analysis’, Proceedings of the 2005 IEEE Workshop on Information Assurance, USMA West Point, NY, June.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance
-
-
Li, W.1
Wang, K.2
Stolfo, S.3
Herzog, B.4
-
26
-
-
0034978467
-
Log-normal distributions across the sciences: keys and clues
-
Limpert, E., Stahel, W. and Abbt, M. (2001) ‘Log-normal distributions across the sciences: keys and clues’, BioScience, Vol. 51, No. 5, pp.341–352.
-
(2001)
BioScience
, vol.51
, Issue.5
, pp. 341-352
-
-
Limpert, E.1
Stahel, W.2
Abbt, M.3
-
27
-
-
0004010787
-
-
v. 1.0.2, Natick, MA and Gaithersburg, MD, July
-
Mathworks Inc. and US National Institute of Standards (2005) JAMA: A Java Matrix Package, v. 1.0.2, Natick, MA and Gaithersburg, MD, July.
-
(2005)
JAMA: A Java Matrix Package
-
-
-
28
-
-
84906229673
-
Dynamic models for file sizes and double pareto distributions
-
Mitzenmacher, M. (2003) ‘Dynamic models for file sizes and double pareto distributions’, Internet Math, Vol. 1, No. 3, pp.305–333.
-
(2003)
Internet Math
, vol.1
, Issue.3
, pp. 305-333
-
-
Mitzenmacher, M.1
-
29
-
-
35348858789
-
Network-level polymorphic shellcode detection using emulation
-
Berlin, Germany, July
-
Polychronakis, M., Anagnostakis, K. and Markatos, E.P. (2006) ‘Network-level polymorphic shellcode detection using emulation’, Proceedings of the Third Conference on Detection of Intrusions and Malware and Vulnerability Assessment, Berlin, Germany, July.
-
(2006)
Proceedings of the Third Conference on Detection of Intrusions and Malware and Vulnerability Assessment
-
-
Polychronakis, M.1
Anagnostakis, K.2
Markatos, E.P.3
-
30
-
-
84950303674
-
-
(IDA plugin), Trier, Germany, November
-
Porst, S. (2005) InstructionCounter (IDA plugin), Trier, Germany, November.
-
(2005)
InstructionCounter
-
-
Porst, S.1
-
33
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP complete
-
Spinellis, D. (2003) ‘Reliable identification of bounded-length viruses is NP complete’, IEEE Transactions on Information Theory, Vol. 49, No. 1, pp.280–284.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
35
-
-
14344254800
-
Hunting for metamorphic
-
Prague, Czech Republic, September
-
Szor, P. and Ferrie, P. (2001) ‘Hunting for metamorphic’, Proceedings of the 11th Virus Bulletin Conference, Prague, Czech Republic, September, pp.123–144.
-
(2001)
Proceedings of the 11th Virus Bulletin Conference
, pp. 123-144
-
-
Szor, P.1
Ferrie, P.2
-
36
-
-
84960561455
-
On computable numbers with an application to the Entscheidungsproblem
-
Turing, A. (1936) ‘On computable numbers with an application to the Entscheidungsproblem’, Proceedings of the London Math Society, Vol. 42, No. 2, pp.230–265.
-
(1936)
Proceedings of the London Math Society
, vol.42
, Issue.2
, pp. 230-265
-
-
Turing, A.1
-
37
-
-
84950304544
-
-
v 1.01, Palo Alto, CA, December
-
VMWare Inc. (2005) VMWare Player, v 1.01, Palo Alto, CA, December.
-
(2005)
VMWare Player
-
-
-
38
-
-
78149352887
-
PEAT- a toolkit for detecting and analyzing malicious software
-
Washington, DC, December
-
Weber, M., Schmid, M., Schatz, M. and Geyer, D. (2002) ‘PEAT- a toolkit for detecting and analyzing malicious software’, Proceedings of the 18th Annual Computer Security Applications Conference, Washington, DC, December.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
-
-
Weber, M.1
Schmid, M.2
Schatz, M.3
Geyer, D.4
-
40
-
-
84950304583
-
Cramer’s V
-
San Francisco, CA, April
-
Woo, C. (2005) ‘Cramer’s V’, PlanetMath.org, San Francisco, CA, April.
-
(2005)
PlanetMath.org
-
-
Woo, C.1
-
41
-
-
33847210738
-
Software obfuscation from crackers’ viewpoint
-
Puerto Vallarta, Mexico, January
-
Yamauchi, H., Kanzaki, Y., Monden, A., Nakamura, M. and Matsumoto, K. (2006) ‘Software obfuscation from crackers’ viewpoint’, Proceedings of the 2nd IASTED International Conference on Advances in Computer Science and Technology, Puerto Vallarta, Mexico, January, pp.286–291.
-
(2006)
Proceedings of the 2nd IASTED International Conference on Advances in Computer Science and Technology
, pp. 286-291
-
-
Yamauchi, H.1
Kanzaki, Y.2
Monden, A.3
Nakamura, M.4
Matsumoto, K.5
|