메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-38

Visual analysis of malware behavior using treemaps and thread graphs

Author keywords

Behavior analysis; Information visualization; Invasive software

Indexed keywords

AUTOMATICALLY GENERATED; BEHAVIOR ANALYSIS; INFORMATION VISUALIZATION; INVASIVE SOFTWARE; MALICIOUS BEHAVIOR; MALICIOUS SOFTWARE; MALWARES; TREE-MAPS; VISUAL ANALYSIS; VISUALIZATION TECHNIQUE;

EID: 77949354717     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VIZSEC.2009.5375540     Document Type: Conference Paper
Times cited : (88)

References (12)
  • 6
    • 77949400742 scopus 로고    scopus 로고
    • Norman ASA. Norman SandBox. http://sandbox.norman.no/.
    • SandBox
  • 9
    • 84976715951 scopus 로고
    • Tree Visualization With Tree-Maps: 2-D Space-Filling Approach
    • Ben Shneiderman. Tree Visualization With Tree-Maps: 2-D Space-Filling Approach. ACM Trans. Graph., 11(1), 1992.
    • (1992) ACM Trans. Graph , vol.11 , Issue.1
    • Shneiderman, B.1
  • 10
    • 77949394213 scopus 로고    scopus 로고
    • Internet:, April
    • Symantec. Internet Security Threat Report Volume XIV. Internet: http://www.symantec.com/business/theme.jsp?themeid= threatreport, April 2009.
    • (2009) Internet Security Threat Report Volume XIV
  • 11
    • 34047110218 scopus 로고    scopus 로고
    • CWSandbox: Towards automated dynamic binary analysis
    • March
    • Carsten Willems, Thorsten Holz, and Felix Freiling. CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy, 5(2), March 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.