-
1
-
-
70449681705
-
-
Symantec Internet Security Threat Reports I-XI Jan 2002-Jan
-
Symantec Internet Security Threat Reports I-XI (Jan 2002-Jan 2008).
-
(2008)
-
-
-
2
-
-
70350275961
-
Grew by 100% during 2007
-
F-Secure Corporation, Press release
-
F-Secure Corporation, "F-Secure Reports Amount of Malware Grew by 100% during 2007", Press release, 2007.
-
(2007)
F-Secure Reports Amount of Malware
-
-
-
3
-
-
48649089436
-
Improving Proactive Detection of Packed Malware
-
March, available at
-
A. Stepan, "Improving Proactive Detection of Packed Malware", Virus Buletin, March 2006, available at http://www.virusbtn.com/virusbulletin/ archive/2006/03/vb200603-packed.dkb
-
(2006)
Virus Buletin
-
-
Stepan, A.1
-
4
-
-
50149118846
-
Classification of Packed Executables for Accurate Computer Virus Detection
-
Elsevier
-
R. Perdisci, A. Lanzi, W. Lee, "Classification of Packed Executables for Accurate Computer Virus Detection", Pattern Recognition Letters, 29(14), pp. 1941-1946, Elsevier, 2008.
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.14
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
5
-
-
70449654402
-
-
available at
-
AVG Free Antivirus, available at http://free.avg.com/.
-
-
-
-
6
-
-
70449665749
-
-
available at
-
Panda Antivirus, available at http://www.pandasecurity.com/.
-
Panda Antivirus
-
-
-
7
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
USA, IEEe Press
-
M.G. Schultz, E. Eskin, E. Zadok, S.J. Stolfo, "Data mining methods for detection of new malicious executables", IEEE Symposium on Security and Privacy, pp. 38-49, USA, IEEe Press, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
9
-
-
0037700468
-
Biologically inspired defenses against computer viruses
-
IJCAI, pp, USA
-
J. Kephart, G. Sorkin, W. Arnold, D. Chess, G. Tesauro, S. White, "Biologically inspired defenses against computer viruses", International Joint Conference on Artificial Intelligence (IJCAI), pp. 985-996, USA, 1995.
-
(1995)
International Joint Conference on Artificial Intelligence
, pp. 985-996
-
-
Kephart, J.1
Sorkin, G.2
Arnold, W.3
Chess, D.4
Tesauro, G.5
White, S.6
-
10
-
-
0029488806
-
MCF: A malicious code filter
-
Elseveir
-
R.W. Lo, K.N. Levitt, R.A. Olsson, "MCF: A malicious code filter", Computers & Security, 14(6):541-566, Elseveir, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
11
-
-
34748865971
-
A Feature Selection and Evaluation Scheme for Computer Virus Detection
-
USA, IEEE Press
-
O. Henchiri, N. Japkowicz, "A Feature Selection and Evaluation Scheme for Computer Virus Detection", IEEE International Conference on Data Mining (ICDM), pp. 891-895, USA, IEEE Press, 2006.
-
(2006)
IEEE International Conference on Data Mining (ICDM)
, pp. 891-895
-
-
Henchiri, O.1
Japkowicz, N.2
-
12
-
-
70449654401
-
Automatic Classification of Executable Code for Computer Virus Detection
-
Springer, Poland
-
P. Kierski, M. Okoniewski, P. Gawrysiak, "Automatic Classification of Executable Code for Computer Virus Detection", International Conference on Intelligent Information Systems, pp. 277-284, Springer, Poland, 2003.
-
(2003)
International Conference on Intelligent Information Systems
, pp. 277-284
-
-
Kierski, P.1
Okoniewski, M.2
Gawrysiak, P.3
-
13
-
-
33746864380
-
Detection of New Malicious Code Using N-grams Signatures
-
Springer, Poland
-
T. Abou-Assaleh, N. Cercone, V. Keselj, R. Sweidan. "Detection of New Malicious Code Using N-grams Signatures", International Conference on Intelligent Information Systems, pp. 193-196, Springer, Poland, 2003.
-
(2003)
International Conference on Intelligent Information Systems
, pp. 193-196
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
15
-
-
33745456200
-
Fileprints: Identifying filetypes by n-gram analysis
-
USA, IEEE Press
-
W.J. Li, K. Wang, S.J. Stolfo, B. Herzog, "Fileprints: identifying filetypes by n-gram analysis", IEEE Information Assurance Workshop, USA, IEEE Press, 2005.
-
(2005)
IEEE Information Assurance Workshop
-
-
Li, W.J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
16
-
-
84882697421
-
Towards Stealthy Malware Detection
-
Springer, USA
-
S.J. Stolfo, K. Wang, W.J. Li, "Towards Stealthy Malware Detection", Advances in Information Security, Vol. 27, pp. 231-249, Springer, USA, 2007.
-
(2007)
Advances in Information Security
, vol.27
, pp. 231-249
-
-
Stolfo, S.J.1
Wang, K.2
Li, W.J.3
-
17
-
-
38049030703
-
A Study of Malcode-Bearing Documents
-
Springer, Switzerland
-
W.J. Li, S.J. Stolfo, A. Stavrou, E. Androulaki, A.D. Keromytis, "A Study of Malcode-Bearing Documents", International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), pp. 231-250, Springer, Switzerland, 2007.
-
(2007)
International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA)
, pp. 231-250
-
-
Li, W.J.1
Stolfo, S.J.2
Stavrou, A.3
Androulaki, E.4
Keromytis, A.D.5
-
18
-
-
49949094798
-
Embedded Malware Detection using Markov n-Grams
-
Springer, France
-
M.Z. Shafiq, S.A. Khayam, M. Farooq, "Embedded Malware Detection using Markov n-Grams", International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), pp. 88-107, Springer, France, 2008.
-
(2008)
International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA)
, pp. 88-107
-
-
Shafiq, M.Z.1
Khayam, S.A.2
Farooq, M.3
-
19
-
-
37849017546
-
Mining Specifications of Malicious Behavior
-
Croatia
-
M. Christodorescu, S. Jha, and C. Kruegal, "Mining Specifications of Malicious Behavior", European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2007), pp. 5-14, Croatia, 2007.
-
(2007)
European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegal, C.3
-
20
-
-
70449648576
-
Heuristic Anti-Virus Technology
-
USA, available at
-
Frans Veldman, "Heuristic Anti-Virus Technology", International Virus Bulletin Conference, pp. 67-76, USA, 1993, available at http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs1.htm.
-
(1993)
International Virus Bulletin Conference
, pp. 67-76
-
-
Veldman, F.1
-
21
-
-
70449666740
-
-
Jay Munro, Antivirus Research and Detection Techniques, Antivirus Research and Detection Techniques, ExtremeTech, 2002, available at http://www.extremetech.com/article2/0,2845,367051,00.asp.
-
Jay Munro, "Antivirus Research and Detection Techniques", Antivirus Research and Detection Techniques, ExtremeTech, 2002, available at http://www.extremetech.com/article2/0,2845,367051,00.asp.
-
-
-
-
22
-
-
0025725905
-
Instance-based learning algorithms
-
D.W. Aha, D. Kibler, M.K. Albert, "Instance-based learning algorithms", Journal of Machine Learning, Vol. 6, pp. 37-66, 1991.
-
(1991)
Journal of Machine Learning
, vol.6
, pp. 37-66
-
-
Aha, D.W.1
Kibler, D.2
Albert, M.K.3
-
23
-
-
84945708697
-
On relevance, probabilistic indexing and information retrieval
-
M.E. Maron, J.L. Kuhns, "On relevance, probabilistic indexing and information retrieval", Journal of the Association of Computing Machinery, 7(3), pp.216-244, 1960.
-
(1960)
Journal of the Association of Computing Machinery
, vol.7
, Issue.3
, pp. 216-244
-
-
Maron, M.E.1
Kuhns, J.L.2
-
24
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund, R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting", Journal of Computer and System Sciences, No. 55, pp. 23-37, 1997
-
(1997)
Journal of Computer and System Sciences
, Issue.55
, pp. 23-37
-
-
Freund, Y.1
Schapire, R.E.2
-
26
-
-
0003957032
-
-
Morgan Kaufmann, 2nd edition, USA
-
I.H. Witten, E. Frank, "Data mining: Practical machine learning tools and techniques", Morgan Kaufmann, 2nd edition, USA, 2005.
-
(2005)
Data mining: Practical machine learning tools and techniques
-
-
Witten, I.H.1
Frank, E.2
-
28
-
-
85077723796
-
CloudAV: N-Version Antivirus in the Network Cloud
-
USA
-
J. Oberheide, E. Cooke, F. Jahanian. "CloudAV: N-Version Antivirus in the Network Cloud", USENIX Security Symposium, pp. 91-106, USA, 2008.
-
(2008)
USENIX Security Symposium
, pp. 91-106
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
29
-
-
70449680129
-
-
T. Fawcett, ROC Graphs: Notes and Practical Considerations for Researchers, TR HPL-2003-4, HP Labs, USA, 2004.
-
T. Fawcett, "ROC Graphs: Notes and Practical Considerations for Researchers", TR HPL-2003-4, HP Labs, USA, 2004.
-
-
-
-
30
-
-
21244485773
-
The partial area under the summary ROC curve
-
S.D. Walter, "The partial area under the summary ROC curve", Statistics in Medicine, 24(13), pp. 2025-2040, 2005.
-
(2005)
Statistics in Medicine
, vol.24
, Issue.13
, pp. 2025-2040
-
-
Walter, S.D.1
|