-
1
-
-
70349119007
-
Advanced polymorphic techniques
-
Beaucamps P.: Advanced polymorphic techniques. Int. J. Comput. Sci. 2(3), 194-205 (2007).
-
(2007)
Int. J. Comput. Sci.
, vol.2
, Issue.3
, pp. 194-205
-
-
Beaucamps, P.1
-
3
-
-
35548987507
-
Bias and the limits of pooling for large collections
-
Buckley C., Dimmick D., Soboroff I., Voorhees E.: Bias and the limits of pooling for large collections. Inf. Retr. 10(6), 491-508 (2007).
-
(2007)
Inf. Retr.
, vol.10
, Issue.6
, pp. 491-508
-
-
Buckley, C.1
Dimmick, D.2
Soboroff, I.3
Voorhees, E.4
-
4
-
-
23744485744
-
Testing malware detectors
-
Boston, MA, USA
-
Christodorescu, M., Jha, S.: Testing malware detectors. In Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, Boston, MA, USA, pp. 34-44 (2004).
-
(2004)
In Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
5
-
-
54849432819
-
Digital genome mapping: Advanced binary malware analysis
-
In: Martin, H. (ed.) Chicago, IL, USA, Virus Bulletin Ltd
-
Erdélyi, G., Carrera, E.: Digital genome mapping: Advanced binary malware analysis. In: Martin, H. (ed.) Proceedings of the 15th Virus Bulletin International Conference, Chicago, IL, USA, pp. 187-197. Virus Bulletin Ltd (2004).
-
(2004)
Proceedings of the 15th Virus Bulletin International Conference
, pp. 187-197
-
-
Erdélyi, G.1
Carrera, E.2
-
6
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
Filiol E., Jacob G., Le Laird M.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol. 3(1), 23-37 (2007).
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
, pp. 23-37
-
-
Filiol, E.1
Jacob, G.2
Le Laird, M.3
-
7
-
-
0344113893
-
Constructing computer virus phylogenies
-
Goldberg L., Goldberg P., Phillips C., Sorkin G.: Constructing computer virus phylogenies. J. Algorit. 26(1), 188-208 (1998).
-
(1998)
J. Algorit.
, vol.26
, Issue.1
, pp. 188-208
-
-
Goldberg, L.1
Goldberg, P.2
Phillips, C.3
Sorkin, G.4
-
9
-
-
0001996348
-
The probabilities of rooted tree shapes generated by random bifurcation
-
Harding E.F.: The probabilities of rooted tree shapes generated by random bifurcation. Adv. Appl. Prob. 3, 44-77 (1971).
-
(1971)
Adv. Appl. Prob.
, vol.3
, pp. 44-77
-
-
Harding, E.F.1
-
10
-
-
70350618651
-
Simulating malware evolution for evaluating program phylogenies
-
Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA, 70504
-
Hayes, M.: Simulating malware evolution for evaluating program phylogenies. Master's thesis, Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA, 70504 (2008).
-
(2008)
Master's thesis
-
-
Hayes, M.1
-
11
-
-
70350618951
-
Infection Vectors
-
Retrieved from, 17 Feb 2008
-
Infection Vectors. Agobot and the kitchen sink. Retrieved from http://www.infectionvectors.com/vectors/kitchensink.htm, 17 Feb 2008.
-
(2008)
Agobot and the Kitchen Sink
-
-
-
12
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim M.E., Lakhotia A.W.A., Parida L.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1), 13-23 (2005).
-
(2005)
J. Comput. Virol.
, vol.1
, Issue.1
, pp. 13-23
-
-
Karim, M.E.1
Lakhotia, A.W.A.2
Parida, L.3
-
13
-
-
0038163983
-
CLUTO-a clustering toolkit
-
Deptment of Computer Science, University of Minnesota
-
Karypis, G.: CLUTO-a clustering toolkit. Technical Report TR 02-017, Deptment of Computer Science, University of Minnesota (2003).
-
(2003)
Technical Report TR 02-017
-
-
Karypis, G.1
-
15
-
-
34547448056
-
Finding diversity in remote code injection exploits
-
Rio de Janeiro, Brazil
-
Ma, J., Dunagan, J., Wang, H.J., Savage, S., Voelker, G.M.: Finding diversity in remote code injection exploits. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, Brazil, pp. 53-64 (2006).
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 53-64
-
-
Ma, J.1
Dunagan, J.2
Wang, H.J.3
Savage, S.4
Voelker, G.M.5
-
16
-
-
70350622741
-
The wildlist is dead: Long live the wildlist!
-
In: Martin, H. (ed.) Vienna, Austria
-
Marx, A., Dressman, F.: The wildlist is dead: Long live the wildlist! In: Martin, H. (ed.) Proceedings of the 18th Virus Bulletin International Conference, Vienna, Austria, pp. 136-147 (2007).
-
(2007)
Proceedings of the 18th Virus Bulletin International Conference
, pp. 136-147
-
-
Marx, A.1
Dressman, F.2
-
17
-
-
0042629743
-
Towards the development of computational tools for evaluating phylogenetic network reconstruction
-
Nakhleh, L., Sun, J., Warnow, T., Linder, C., Moret, B., Tholse, A.: Towards the development of computational tools for evaluating phylogenetic network reconstruction. In: Proceedings of the Eighth Pacific Symposium on Biocomputing, pp. 315-326 (2003).
-
(2003)
Proceedings of the Eighth Pacific Symposium on Biocomputing
, pp. 315-326
-
-
Nakhleh, L.1
Sun, J.2
Warnow, T.3
Linder, C.4
Moret, B.5
Tholse, A.6
-
18
-
-
0030928378
-
Seq-Gen: An application for the Monte Carlo simulation of DNA sequence evolution along phylogenetic trees
-
Rambaut A., Grassly N.: Seq-Gen: an application for the Monte Carlo simulation of DNA sequence evolution along phylogenetic trees. Bioinformatics 13(3), 235-238 (1997).
-
(1997)
Bioinformatics
, vol.13
, Issue.3
, pp. 235-238
-
-
Rambaut, A.1
Grassly, N.2
-
19
-
-
0019424782
-
Comparison of phylogenetic trees
-
Robinson D., Foulds L.: Comparison of phylogenetic trees. Math. Biosci. 53(1/2), 131-147 (1981).
-
(1981)
Math. Biosci.
, vol.53
, Issue.1-2
, pp. 131-147
-
-
Robinson, D.1
Foulds, L.2
-
20
-
-
0037925631
-
Using benchmarking to advance research: A challenge to software engineering
-
Sim, S.E., Easterbrook, S., Holt, R.C.: Using benchmarking to advance research: A challenge to software engineering. In: Proceedings of the 25th International Conference on Software Engineering (ICSE'03), pp. 74-83 (2003).
-
(2003)
Proceedings of the 25th International Conference on Software Engineering (ICSE'03)
, pp. 74-83
-
-
Sim, S.E.1
Easterbrook, S.2
Holt, R.C.3
-
21
-
-
70350622740
-
-
Symantec global internet security threat report volume XIII: Trends for July-December 2007, April
-
Symantec. Symantec global internet security threat report volume XIII: Trends for July-December 2007, April 2008.
-
(2008)
Symantec
-
-
-
22
-
-
34249899090
-
Analyzing worms and network traffic using compression
-
Wehner S.: Analyzing worms and network traffic using compression. J. Comput. Secur. 15, 303-320 (2007).
-
(2007)
J. Comput. Secur.
, vol.15
, pp. 303-320
-
-
Wehner, S.1
-
23
-
-
11244323863
-
Evolution spectrographs: Visualizing punctuated change in software evolution
-
Wu, J., Spitzer, C.W., Hassan, A.E., Holt, R.C.: Evolution spectrographs: Visualizing punctuated change in software evolution. In: Proceedings of the Seventh International Workshop on the Principles of Software Evolution (IWPSE'04), pp. 57-66 (2004).
-
(2004)
Proceedings of the Seventh International Workshop on the Principles of Software Evolution (IWPSE'04)
, pp. 57-66
-
-
Wu, J.1
Spitzer, C.W.2
Hassan, A.E.3
Holt, R.C.4
|