-
1
-
-
77949517522
-
-
Karsperky-Labs: Kaspersky Security Bulletin: Statistics 2008 (2009)
-
Karsperky-Labs: Kaspersky Security Bulletin: Statistics 2008 (2009)
-
-
-
-
2
-
-
84924223669
-
-
Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, February 2003, pp. 169-186 (2003)
-
Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, February 2003, pp. 169-186 (2003)
-
-
-
-
5
-
-
77949532558
-
-
Last accessed: September 29, 2009
-
VX heavens (2009), http://vx.netlux.org/ (Last accessed: September 29, 2009)
-
VX heavens (2009)
-
-
-
7
-
-
24344458137
-
Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
-
Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1226-1238 (2005)
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.1226-1238
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
9
-
-
41849115277
-
Estimating the Selectivity of tf-idf based Cosine Similarity Predicates
-
Tata, S., Patel, J.: Estimating the Selectivity of tf-idf based Cosine Similarity Predicates. SIGMOD Record 36(2), 75-80 (2007)
-
(2007)
SIGMOD Record
, vol.36
, Issue.2
, pp. 75-80
-
-
Tata, S.1
Patel, J.2
-
10
-
-
54849432819
-
Digital genome mapping-advanced binary malware analysis
-
Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference, pp. 187-197 (2004)
-
(2004)
Virus Bulletin Conference
, pp. 187-197
-
-
Carrera, E.1
Erdélyi, G.2
-
14
-
-
74549138307
-
N-Grams-based file signatures for malware detection
-
Santos, I., Penya, Y., Devesa, J., Bringas, P.: N-Grams-based file signatures for malware detection. In: Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS), Volume AIDSS, pp. 317-320 (2009)
-
(2009)
Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS)
, vol.AIDSS
, pp. 317-320
-
-
Santos, I.1
Penya, Y.2
Devesa, J.3
Bringas, P.4
-
15
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 32-46 (2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
16
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
-
Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
17
-
-
33748932391
-
Dynamic analysis of malicious code
-
Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. Journal in Computer Virology 2(1), 67-77 (2006)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
, pp. 67-77
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
19
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy 5(2), 32-39 (2007)
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|