-
1
-
-
84952737129
-
An abstract theory of computer viruses (invited talk)
-
Springer, New York
-
Adleman, L.: An abstract theory of computer viruses (invited talk). In: CRYPTO '88: Proceedings on Advances in cryptology, pp. 354-374. Springer, New York (1990).
-
(1990)
CRYPTO '88: Proceedings on Advances in Cryptology
, pp. 354-374
-
-
Adleman, L.1
-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. RAID 2007. LNCS, vol. 4637, pp 178-197 (2007).
-
(2007)
RAID 2007. LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
33748932391
-
Dynamic analysis of malicious code
-
Bayer U., Moser A., Kruegel C., Kirda E.: Dynamic analysis of malicious code. J. Comput. Virol. 2, 67-77 (2006).
-
(2006)
J. Comput. Virol.
, vol.2
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
4
-
-
35348995283
-
Metamorphism, formal grammars and undecidable code mutation
-
Beaucamps P., Filiol E.: Metamorphism, formal grammars and undecidable code mutation. J. Comp. Sci. 2(1), 70-75 (2007).
-
(2007)
J. Comp. Sci.
, vol.2
, Issue.1
, pp. 70-75
-
-
Beaucamps, P.1
Filiol, E.2
-
5
-
-
33947609379
-
On the possibility of practically obfuscating programs towards aunified perspective of code protection
-
Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating programs towards aunified perspective of code protection. J. Comp. Virol. 3(1), 2007.
-
(2007)
J. Comp. Virol.
, vol.3
, Issue.1
-
-
Beaucamps, P.1
Filiol, E.2
-
6
-
-
18244383805
-
Relevance vector machine and support vector machine classifier analysis of scanning laser polarimetry retinal nerve fiber layer measurements
-
Bowd C., Medeiros F.A., Zhang Z., Zangwill L.M., Hao J., Lee T., Sejnowski T.J., Weinreb R.N., Goldbaum M.H.: Relevance vector machine and support vector machine classifier analysis of scanning laser polarimetry retinal nerve fiber layer measurements. Invest. Ophthalmol. Vis. Sci. 46, 1322-1329 (2005).
-
(2005)
Invest. Ophthalmol. Vis. Sci.
, vol.46
, pp. 1322-1329
-
-
Bowd, C.1
Medeiros, F.A.2
Zhang, Z.3
Zangwill, L.M.4
Hao, J.5
Lee, T.6
Sejnowski, T.J.7
Weinreb, R.N.8
Goldbaum, M.H.9
-
7
-
-
0030211964
-
Bagging predicators
-
Breiman L.: Bagging predicators. Mach. Learn. 24, 123-140 (1996).
-
(1996)
Mach. Learn.
, vol.24
, pp. 123-140
-
-
Breiman, L.1
-
8
-
-
37849017546
-
Mining specifications of malicious behavior
-
Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In Proceedings of ESEC/FSE07, pp 5-14 (2007).
-
(2007)
Proceedings of ESEC/FSE07
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
9
-
-
0031361611
-
Machine learning research: Four current directions
-
Dietterich T.G.: Machine learning research: Four current directions. AI Magaz. 18(4), 97-136 (1997).
-
(1997)
AI Magaz.
, vol.18
, Issue.4
, pp. 97-136
-
-
Dietterich, T.G.1
-
11
-
-
33748978409
-
Malware pattern scanning schemes secure against black-box analysis
-
Filiol E.: Malware pattern scanning schemes secure against black-box analysis. J. Comp. Virol. 2(1), 35-50 (2006).
-
(2006)
J. Comp. Virol.
, vol.2
, Issue.1
, pp. 35-50
-
-
Filiol, E.1
-
12
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
Filiol E., Jacob G., Liard M.L.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comp. Virol. 3(1), 27-37 (2007).
-
(2007)
J. Comp. Virol.
, vol.3
, Issue.1
, pp. 27-37
-
-
Filiol, E.1
Jacob, G.2
Liard, M.L.3
-
13
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund Y., Schapire R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comp. Syst. Sci. 55(1), 119-139 (1997).
-
(1997)
J. Comp. Syst. Sci.
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
14
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
Hsu C., Lin C.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13, 415-425 (2002).
-
(2002)
IEEE Trans. Neural Netw.
, vol.13
, pp. 415-425
-
-
Hsu, C.1
Lin, C.2
-
15
-
-
84958774749
-
Support vector machine ensemble with bagging
-
Kim, H., Pang, S., Je, H., Kim, D., Bang, S.: Support vector machine ensemble with bagging. SVM 2002, LNCSI, vol. 2388, pp 397-408 (2002).
-
(2002)
SVM 2002, LNCSI
, vol.2388
, pp. 397-408
-
-
Kim, H.1
Pang, S.2
Je, H.3
Kim, D.4
Bang, S.5
-
16
-
-
0242709384
-
Efficient handling of high-dimensional feature spaces by randomized classifier ensembles
-
Kolcz, A., Sun, X., Kalita, J.: Efficient handling of high-dimensional feature spaces by randomized classifier ensembles. In: Proceedings of KDD'02 (2002).
-
(2002)
Proceedings of KDD'02
-
-
Kolcz, A.1
Sun, X.2
Kalita, J.3
-
17
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
Kolter, J., Maloof, M.: Learning to detect malicious executables in the wild. In: Proceedings of KDD'04 (2004).
-
(2004)
Proceedings of KDD'04
-
-
Kolter, J.1
Maloof, M.2
-
18
-
-
0036772522
-
Bayesian automatic relevance determination algorithms for classifying gene expression data
-
Li Y., Campbell C., Tipping M.: Bayesian automatic relevance determination algorithms for classifying gene expression data. Bioinformatics 18, 1232-1239 (2002).
-
(2002)
Bioinformatics
, vol.18
, pp. 1232-1239
-
-
Li, Y.1
Campbell, C.2
Tipping, M.3
-
19
-
-
80052653789
-
Feature selection with rvm and its application to prediction modeling
-
Li, D., Hu, W.: Feature selection with rvm and its application to prediction modeling. AI 2006, LNAI, vol. 4304, pp 1140-1144 (2006).
-
(2006)
AI 2006, LNAI
, vol.4304
, pp. 1140-1144
-
-
Li, D.1
Hu, W.2
-
20
-
-
0034269416
-
Attacking malicious code: Report to the infosec research council
-
McGraw G., Morrisett G.: Attacking malicious code:report to the infosec research council. IEEE Softw. 17(5), 33-41 (2000).
-
(2000)
IEEE Softw.
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
21
-
-
0035789318
-
Experimental comparisons of online and batch versions of bagging and boosting
-
Oza, N.C., Russell, S.: Experimental comparisons of online and batch versions of bagging and boosting. In: Proceedings of KDD'01 (2001).
-
(2001)
Proceedings of KDD'01
-
-
Oza, N.C.1
Russell, S.2
-
23
-
-
33751168025
-
N-gram analysis for computer virus detection
-
Reddy D.K.S., Pujari A.K.: N-gram analysis for computer virus detection. J. Comput. Virol. 2, 231-239 (2006).
-
(2006)
J. Comput. Virol.
, vol.2
, pp. 231-239
-
-
Reddy, D.K.S.1
Pujari, A.K.2
-
24
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Proceedings of 2001 IEEE Symposium on 14-16 May
-
Schultz, M., Eskin, E., Zadok, E.: Data mining methods for detection of new malicious executables. In: Security and privacy, 2001. Proceedings of 2001 IEEE Symposium on 14-16 May, pp 38-49 (2001).
-
(2001)
Security and Privacy, 2001
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
-
25
-
-
0002442796
-
Text categorization
-
Sebastiani F.: Text categorization. ACM Comput. Surv. 34(1), 1-47 (2002).
-
(2002)
ACM Comput. Surv.
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
26
-
-
38049002089
-
Boosting rvm classifiers for large data sets
-
LNCSI
-
Silva, C., Ribeiro, B., Sung, A.H.: Boosting rvm classifiers for large data sets. ICANNGA 2007, Part II, LNCSI, vol. 4432, pp 228-237 (2007).
-
(2007)
ICANNGA 2007
, vol.4432
, Issue.PART II
, pp. 228-237
-
-
Silva, C.1
Ribeiro, B.2
Sung, A.H.3
-
27
-
-
21644475665
-
Static analyzer of vicious executables (save)
-
Sung, A., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (save). In: Proceedings of the 20th Annual Computer Security Applications Conference (2004).
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
-
-
Sung, A.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
28
-
-
33745780169
-
A novel refinement approach for text categorization
-
Tan, S., Cheng, X., Ghanem, M., Wang, B., Xu, H.: A novel refinement approach for text categorization. In: Proceeding of the ACM CIKM, pp 469-476, 2005.
-
(2005)
Proceeding of the ACM CIKM
, pp. 469-476
-
-
Tan, S.1
Cheng, X.2
Ghanem, M.3
Wang, B.4
Xu, H.5
-
29
-
-
0001224048
-
Sparse bayesian learning and the relevance vector machine
-
Tipping M.: Sparse bayesian learning and the relevance vector machine. J. Mach. Learn. Res. 1, 211-214 (2001).
-
(2001)
J. Mach. Learn. Res.
, vol.1
, pp. 211-214
-
-
Tipping, M.1
-
30
-
-
21844440579
-
Core vector machines: Fast svm training on very large data sets
-
Tsang I.W., Kwok J.T., Cheung P.M.: Core vector machines: Fast svm training on very large data sets. J. Mach. Learn. Res. 6, 363-392 (2005).
-
(2005)
J. Mach. Learn. Res.
, vol.6
, pp. 363-392
-
-
Tsang, I.W.1
Kwok, J.T.2
Cheung, P.M.3
-
31
-
-
2342663706
-
Virus detection using data mining techniques
-
Wang, J., Deng, P., Fan, Y., Jaw, L., Liu, Y.: Virus detection using data mining techniques. In: Proceedings of IEEE International Conference on Data Mining (2003).
-
(2003)
Proceedings of IEEE International Conference on Data Mining
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
-
34
-
-
36849096063
-
IMDS: Intelligent malware detection system
-
Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: Intelligent malware detection system. In: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD 2007) (2007).
-
(2007)
Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD 2007)
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
-
35
-
-
77952390455
-
Classifying large data sets using svms with hierarchical clusters
-
Yu, H., Yang, J., Han, J.: Classifying large data sets using svms with hierarchical clusters. In: Proceedings of KDD'03 (2003).
-
(2003)
Proceedings of KDD'03
-
-
Yu, H.1
Yang, J.2
Han, J.3
-
36
-
-
34249753618
-
Support vector network
-
Vapnik C.C.: Support vector network. Mach. Learn. 20, 273-297 (1995).
-
(1995)
Mach. Learn.
, vol.20
, pp. 273-297
-
-
Vapnik, C.C.1
|