-
1
-
-
33845807843
-
Spam filtering using statistical data compression models
-
December
-
A. Bratko, G. Cormack, B. Filipič, T. Lynam, and B. Zupan. Spam filtering using statistical data compression models. Journal of Machine Learning Research (JMLR), 7:2673-2698, December 2006.
-
(2006)
Journal of Machine Learning Research (JMLR)
, vol.7
, pp. 2673-2698
-
-
Bratko, A.1
Cormack, G.2
Filipič, B.3
Lynam, T.4
Zupan, B.5
-
2
-
-
35349006204
-
Software transformations to improve malware detection
-
M. Christodorescu, S. Jha, J. Kinder, S. Katzenbeisser, and H. Veith. Software transformations to improve malware detection. Journal in Computer Virology, 3:253-265, 2007.
-
(2007)
Journal in Computer Virology
, vol.3
, pp. 253-265
-
-
Christodorescu, M.1
Jha, S.2
Kinder, J.3
Katzenbeisser, S.4
Veith, H.5
-
3
-
-
0021405335
-
Data compression using adaptive coding and partial string matching
-
J. Cleary and I. Witten. Data compression using adaptive coding and partial string matching. IEEE Transactions on Communications, COM-32(4):396-402, 1984.
-
(1984)
IEEE Transactions on Communications
, vol.COM-32
, Issue.4
, pp. 396-402
-
-
Cleary, J.1
Witten, I.2
-
4
-
-
33244496014
-
Unbounded length contexts of ppm
-
J. Cleary and I. Witten. Unbounded length contexts of ppm. The computer Journal, 40(2/3):67-75, 1997.
-
(1997)
The computer Journal
, vol.40
, Issue.2-3
, pp. 67-75
-
-
Cleary, J.1
Witten, I.2
-
5
-
-
0023536787
-
Data compression using dynamic markov modeling
-
G. Cormack and R. Horspool. Data compression using dynamic markov modeling. The Computer Journal, 30(6):541-550, 1987.
-
(1987)
The Computer Journal
, vol.30
, Issue.6
, pp. 541-550
-
-
Cormack, G.1
Horspool, R.2
-
6
-
-
70349248824
-
Ppm model cleaning
-
Washington, DC, USA, IEEE Computer Society
-
M. Drinic, D. Kirovski, and M. Potkonjak. Ppm model cleaning. In DCC '03: Proceedings of the Conference on Data Compression, page 163, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
DCC '03: Proceedings of the Conference on Data Compression
, pp. 163
-
-
Drinic, M.1
Kirovski, D.2
Potkonjak, M.3
-
8
-
-
46249103547
-
A multiple instance learning strategy for combating good word attacks on spam filters
-
June
-
Z. Jorgensen, Y. Zhou, and M. Inge. A multiple instance learning strategy for combating good word attacks on spam filters. Journal of Machine Learning Research (JMLR), 9:1115-1146, June 2008.
-
(2008)
Journal of Machine Learning Research (JMLR)
, vol.9
, pp. 1115-1146
-
-
Jorgensen, Z.1
Zhou, Y.2
Inge, M.3
-
9
-
-
34547457465
-
Secure and advanced unpacking using computer emulation
-
S. Josse. Secure and advanced unpacking using computer emulation. Journal in Computer Virology, 3:221-236, 2007.
-
(2007)
Journal in Computer Virology
, vol.3
, pp. 221-236
-
-
Josse, S.1
-
10
-
-
0037700468
-
Biologically inspired defenses against computer viruses
-
Morgan Kaufman
-
J. Kephart, G. Sorkin, W. Arnold, D. Cheese, G. Tesauro, and S. White. Biologically inspired defenses against computer viruses. In Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI95), pages 985-996. Morgan Kaufman, 1995.
-
(1995)
Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI95)
, pp. 985-996
-
-
Kephart, J.1
Sorkin, G.2
Arnold, W.3
Cheese, D.4
Tesauro, G.5
White, S.6
-
11
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
13
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
Washington, DC, USA, IEEE Computer Society
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 289-300, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
14
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Los Alamitos, CA, IEEE Press
-
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo. Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy, pages 38-49, Los Alamitos, CA, 2001. IEEE Press.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
15
-
-
33846192387
-
Deobfuscation: Reverse engineering obfuscated code
-
Washington, DC, USA, IEEE Computer Society
-
S. K. Udupa, S. K. Debray, and M. Madou. Deobfuscation: Reverse engineering obfuscated code. In WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering, pages 45-54, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering
, pp. 45-54
-
-
Udupa, S.K.1
Debray, S.K.2
Madou, M.3
-
18
-
-
33845905176
-
Adaptive spam filtering using dynamic feature space
-
Washington, DC, USA, IEEE Computer Society
-
Y. Zhou, M. S. Mulekar, and P. Nerellapalli. Adaptive spam filtering using dynamic feature space. In ICTAI '05: Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence, pages 302-309, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICTAI '05: Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence
, pp. 302-309
-
-
Zhou, Y.1
Mulekar, M.S.2
Nerellapalli, P.3
|