-
1
-
-
13644274213
-
A survey of peer-to-peer content distribution technologies
-
Androutsellis-Theotokis S., and Spinellis D. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36 4 (2004) 335-371. http://doi.acm.org/10.1145/1041680.1041681
-
(2004)
ACM Computing Surveys
, vol.36
, Issue.4
, pp. 335-371
-
-
Androutsellis-Theotokis, S.1
Spinellis, D.2
-
3
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM, New York, NY, USA
-
Bose A., Hu X., Shin K.G., and Park T. Behavioral detection of malware on mobile handsets. MobiSys '08: Proceeding of the 6th international conference on mobile systems, applications, and services (2008), ACM, New York, NY, USA 225-238. http://doi.acm.org/10.1145/1378600.1378626
-
(2008)
MobiSys '08: Proceeding of the 6th international conference on mobile systems, applications, and services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
4
-
-
39349087037
-
Epidemic thresholds in real networks
-
Chakrabarti D., Wang Y., Wang C., Leskovec J., and Faloutsos C. Epidemic thresholds in real networks. Transactions on Information and System Security 10 4 (2008) 1-26. http://doi.acm.org/10.1145/1284680.1284681
-
(2008)
Transactions on Information and System Security
, vol.10
, Issue.4
, pp. 1-26
-
-
Chakrabarti, D.1
Wang, Y.2
Wang, C.3
Leskovec, J.4
Faloutsos, C.5
-
5
-
-
0042474227
-
Modeling the spread of active worms
-
IEEE
-
Chen Z., Gao L., and Kwiat K. Modeling the spread of active worms. INFOCOM 2003 vol. 3 (2003), IEEE 1890-1900
-
(2003)
INFOCOM 2003
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
7
-
-
70349460853
-
Statistical signatures for fast filtering of instruction-substituting metamorphic malware
-
ACM, New York, NY, USA
-
Chouchane M.R., Walenstein A., and Lakhotia A. Statistical signatures for fast filtering of instruction-substituting metamorphic malware. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode (2007), ACM, New York, NY, USA 31-37. http://doi.acm.org/10.1145/1314389.1314397
-
(2007)
WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode
, pp. 31-37
-
-
Chouchane, M.R.1
Walenstein, A.2
Lakhotia, A.3
-
9
-
-
34547437877
-
A study of malware in peer-to-peer networks
-
ACM, New York, NY, USA
-
Kalafut A., Acharya A., and Gupta M. A study of malware in peer-to-peer networks. IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (2006), ACM, New York, NY, USA 327-332. http://doi.acm.org/10.1145/1177080.1177124
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
, pp. 327-332
-
-
Kalafut, A.1
Acharya, A.2
Gupta, M.3
-
10
-
-
70349448915
-
Renovo: a hidden code extractor for packed executables
-
ACM, New York, NY, USA
-
Kang M.G., Poosankam P., and Yin H. Renovo: a hidden code extractor for packed executables. WORM '07: Proceedings of the 2007 ACM workshop on recurring malcode (2007), ACM, New York, NY, USA 46-53. http://doi.acm.org/10.1145/1314389.1314399
-
(2007)
WORM '07: Proceedings of the 2007 ACM workshop on recurring malcode
, pp. 46-53
-
-
Kang, M.G.1
Poosankam, P.2
Yin, H.3
-
11
-
-
14944345677
-
Transport layer identification of P2P traffic
-
ACM, New York, NY, USA
-
Karagiannis T., Broido A., Faloutsos M., and Claffy K. Transport layer identification of P2P traffic. IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement (2004), ACM, New York, NY, USA 121-134. http://doi.acm.org/10.1145/1028788.1028804
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
13
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter J.Z., and Maloof M.A. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (2006) 2721-2744
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
14
-
-
55349122357
-
A new assessment and improvement model of risk propagation in information security
-
Kondakci S. A new assessment and improvement model of risk propagation in information security. International Journal of Information and Computer Security 1 3 (2007) 341-366
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.3
, pp. 341-366
-
-
Kondakci, S.1
-
15
-
-
42649108776
-
Epidemic state analysis of computers under malware attacks
-
Kondakci S. Epidemic state analysis of computers under malware attacks. Simulation Modelling Practice and Theory 16 5 (2008) 271-285
-
(2008)
Simulation Modelling Practice and Theory
, vol.16
, Issue.5
, pp. 271-285
-
-
Kondakci, S.1
-
17
-
-
34248394369
-
Modeling and analyzing the spread of active worms based on P2P systems
-
Lia T., Guana Z., and Wu X. Modeling and analyzing the spread of active worms based on P2P systems. Computers & Security 26 3 (2007) 213-218
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 213-218
-
-
Lia, T.1
Guana, Z.2
Wu, X.3
-
18
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
ACM Press, New York, NY, USA
-
Liljenstam M., Nicol D.M., Berk V.H., and Gray R.S. Simulating realistic network worm traffic for worm warning system design and testing. WORM '03: Proceedings of the 2003 ACM workshop on rapid malcode (2003), ACM Press, New York, NY, USA 24-33. http://doi.acm.org/10.1145/948187.948193
-
(2003)
WORM '03: Proceedings of the 2003 ACM workshop on rapid malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
19
-
-
0742276097
-
Inside the slammer worm
-
Moore D., Paxson V., Savage S., Shannon C., Staniford S., and Weaver N. Inside the slammer worm. IEEE Security & Privacy 1 4 (2003) 33-39. http://dx.doi.org/10.1109/MSECP.2003.1219056
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
20
-
-
14944359480
-
A hybrid quarantine defense
-
ACM Press, New York, NY, USA
-
Porras P., Briesemeister L., Skinner K., Levitt K., Rowe J., and Ting Y.-C.A. A hybrid quarantine defense. WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode (2004), ACM Press, New York, NY, USA 73-82. http://doi.acm.org/10.1145/1029618.1029630
-
(2004)
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode
, pp. 73-82
-
-
Porras, P.1
Briesemeister, L.2
Skinner, K.3
Levitt, K.4
Rowe, J.5
Ting, Y.-C.A.6
-
21
-
-
51849164885
-
A semantics-based approach to malware detection
-
ACM, New York, NY, USA
-
Preda M.D., Christodorescu M., Jha S., and Debray S. A semantics-based approach to malware detection. POPL '07: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages (2007), ACM, New York, NY, USA 377-388. http://doi.acm.org/10.1145/1190216.1190270
-
(2007)
POPL '07: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages
, pp. 377-388
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
23
-
-
34748891815
-
Peer to peer networks for defense against internet worms
-
ACM Press, New York, NY, USA
-
Shakkottai S., and Srikant R. Peer to peer networks for defense against internet worms. Interperf '06: Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems (2006), ACM Press, New York, NY, USA 5. http://doi.acm.org/10.1145/1190326.1190331
-
(2006)
Interperf '06: Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
, pp. 5
-
-
Shakkottai, S.1
Srikant, R.2
-
24
-
-
34547405407
-
Malware prevalence in the kazaa file-sharing network
-
ACM, New York, NY, USA
-
Shin S., Jung J., and Balakrishnan H. Malware prevalence in the kazaa file-sharing network. IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (2006), ACM, New York, NY, USA 333-338. http://doi.acm.org/10.1145/1177080.1177125
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
, pp. 333-338
-
-
Shin, S.1
Jung, J.2
Balakrishnan, H.3
-
27
-
-
34248403361
-
Polymorphic worm detection and defense: system design, experimental methodology, and data resources
-
ACM, New York, NY, USA
-
Wang J., Hamadeh l., Kesidis G., and Miller D.J. Polymorphic worm detection and defense: system design, experimental methodology, and data resources. LSAD '06: Proceedings of the 2006 SIGCOMM workshop on large-scale attack defense (2006), ACM, New York, NY, USA 169-176. http://doi.acm.org/10.1145/1162666.1162676
-
(2006)
LSAD '06: Proceedings of the 2006 SIGCOMM workshop on large-scale attack defense
, pp. 169-176
-
-
Wang, J.1
Hamadeh, l.2
Kesidis, G.3
Miller, D.J.4
-
28
-
-
36849096063
-
IMDS: intelligent malware detection system
-
ACM, New York, NY, USA
-
Ye Y., Wang D., Li T., and Ye D. IMDS: intelligent malware detection system. KDD '07: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining (2007), ACM, New York, NY, USA 1043-1047. http://doi.acm.org/10.1145/1281192.1281308
-
(2007)
KDD '07: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining
, pp. 1043-1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
-
29
-
-
77950788046
-
Panorama: capturing system-wide information flow for malware detection and analysis
-
ACM, New York, NY, USA
-
Yin H., Song D., Egele M., Kruegel C., and Kirda E. Panorama: capturing system-wide information flow for malware detection and analysis. CCS '07: Proceedings of the 14th ACM conference on computer and communications security (2007), ACM, New York, NY, USA 116-127. http://doi.acm.org/10.1145/1315245.1315261
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on computer and communications security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
30
-
-
77952938124
-
Worm propagation modeling and analysis based on quarantine
-
ACM Press, New York, NY, USA
-
Zhang Y.-K., Wang F.-W., Zhang Y.-Q., and Ma J.-F. Worm propagation modeling and analysis based on quarantine. InfoSecu '04: Proceedings of the 3rd international conference on information security (2004), ACM Press, New York, NY, USA 69-75. http://doi.acm.org/10.1145/1046290.1046305
-
(2004)
InfoSecu '04: Proceedings of the 3rd international conference on information security
, pp. 69-75
-
-
Zhang, Y.-K.1
Wang, F.-W.2
Zhang, Y.-Q.3
Ma, J.-F.4
|