-
2
-
-
50049111622
-
Examining web-based spyware invasion with stateful behavior monitoring
-
17-19 Dec. Piscataway, NJ, USA: IEEE
-
M. Wu, Y. Huang, S. Kuo, "Examining Web-based spyware invasion with stateful behavior monitoring," 13th Pacific Rim International Symposium on Dependable Computing (PRDC '07), 17-19 Dec. Piscataway, NJ, USA: IEEE, pp. 275-81.
-
13th Pacific Rim International Symposium on Dependable Computing (PRDC '07)
, pp. 275-281
-
-
Wu, M.1
Huang, Y.2
Kuo, S.3
-
3
-
-
0027699087
-
Lattice-based access control models
-
Nov.
-
R. Sandhu, "Lattice-based access control models," Computer, vol. 26, Nov. 1993, pp. 9-19.
-
(1993)
Computer
, vol.26
, pp. 9-19
-
-
Sandhu, R.1
-
4
-
-
17644425267
-
FTC cracks down on spyware and PC hijacking, but not true lies
-
R. Stern, "FTC cracks down on spyware and PC hijacking, but not true lies," Micro, vol. 25, 2005, pp. 100-101.
-
(2005)
Micro
, vol.25
, pp. 100-101
-
-
Stern, R.1
-
6
-
-
77952348016
-
-
[accessed 2009-05-18]
-
Spyware, us-cert.gov/reading-room/Spywarehome-0905.pdf [accessed 2009-05-18].
-
-
-
-
7
-
-
12844250664
-
Software in the year 2010
-
T. Bollinger, "Software in the year 2010," IT Professional, vol. 6, 2004, pp. 11-15.
-
(2004)
IT Professional
, vol.6
, pp. 11-15
-
-
Bollinger, T.1
-
8
-
-
23344444212
-
Is spyware an internet nuisance or public menace?
-
H. Qing and T. Dinev, "Is spyware an internet nuisance or public menace?" Communications of the ACM, vol. 48, 2005, pp. 61-66.
-
(2005)
Communications of the ACM
, vol.48
, pp. 61-66
-
-
Qing, H.1
Dinev, T.2
-
9
-
-
9144256106
-
Understanding spyware: Risk and response
-
W. Ames, "Understanding spyware: Risk and response," IT Professional, vol. 6, 2004, pp. 25-29
-
(2004)
IT Professional
, vol.6
, pp. 25-29
-
-
Ames, W.1
-
10
-
-
84878718185
-
Application of data mining based malicious code detection techniques for detecting new spyware
-
Bilkent University
-
C. D. Bozagac, "Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware", White paper, Bilkent University, 2005.
-
(2005)
White Paper
-
-
Bozagac, C.D.1
-
11
-
-
40349106306
-
A stateful approach to spyware detection and removal
-
18-20 Dec. Los Alamitos, CA, USA: IEEE Computer Society
-
M. Wu, Y. Huang, Y. Wang, and S. Kuo, "A stateful approach to spyware detection and removal," 12th Pacific Rim International Symposium on Dependable Computing, (PRDC 2006), 18-20 Dec. Los Alamitos, CA, USA: IEEE Computer Society, pp. 173-182.
-
(2006)
12th Pacific Rim International Symposium on Dependable Computing, (PRDC
, pp. 173-182
-
-
Wu, M.1
Huang, Y.2
Wang, Y.3
Kuo, S.4
-
12
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
14-16 May Los Alamitos, CA, USA: IEEE Computer Society
-
M. Schultz, E. Eskin, F. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables," Proceedings of IEEE Symposium on Security and Privacy, 14-16 May 2001, Los Alamitos, CA, USA: IEEE Computer Society, pp. 38-49.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, F.3
Stolfo, S.4
-
13
-
-
77952371330
-
-
Press Release [accessed 2009-05-14]
-
Zone Alarm, Press Release 2000, http://www.zonealarm.com [accessed 2009-05-14].
-
(2000)
-
-
-
15
-
-
85149612939
-
Fast effective rule induction
-
San Francisco, CA: Morgan Kaufmann Publishers
-
W. Cohen, "Fast effective rule induction," Proc. 12th International Conference on Machine Learning, pp. 115-23, San Francisco, CA: Morgan Kaufmann Publishers, 1995.
-
(1995)
Proc. 12th International Conference on Machine Learning
, pp. 115-123
-
-
Cohen, W.1
-
16
-
-
34748865971
-
A feature selection and evaluation scheme for computer virus detection
-
18-22 Dec., Piscataway, NJ, USA: IEEE
-
O. Henchiri and N. Japkowicz, "A feature selection and evaluation scheme for computer virus detection," 6th International Conference on Data Mining (ICDM'06), 18-22 Dec., Piscataway, NJ, USA: IEEE, pp. 918-922.
-
6th International Conference on Data Mining (ICDM'06)
, pp. 918-922
-
-
Henchiri, O.1
Japkowicz, N.2
-
17
-
-
58849157332
-
Unknown malcode detection using OPCODE representation
-
3-5 Dec., Berlin, Germany: Springer-Verlag
-
R. Moskovitch, C. Feher, N. Tzachar, E. Berger, M. Gitelman, S. Dolev, and Y. Elovici, "Unknown malcode detection using OPCODE representation," 1st European Conference on Intelligence and Security Informatics, (EuroISI 2008), 3-5 Dec., Berlin, Germany: Springer-Verlag, pp. 204-215.
-
(2008)
1st European Conference on Intelligence and Security Informatics, (EuroISI
, pp. 204-215
-
-
Moskovitch, R.1
Feher, C.2
Tzachar, N.3
Berger, E.4
Gitelman, M.5
Dolev, S.6
Elovici, Y.7
-
18
-
-
38349051945
-
Applying machine learning techniques for detection of malicious code in network traffic
-
10-13 Sept., Berlin, Germany: Springer-Verlag
-
Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer., "Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic", Proceedings of the 30th annual German conference on Advances in Artificial Intelligence, KI 2007, 10-13 Sept., Berlin, Germany: Springer-Verlag, pp. 44-50.
-
(2007)
Proceedings of the 30th Annual German Conference on Advances in Artificial Intelligence, KI
, pp. 44-50
-
-
Elovici, Y.1
Shabtai, A.2
Moskovitch, R.3
Tahan, G.4
Glezer, C.5
-
19
-
-
18844362133
-
N-gram-based detection of new malicious code
-
28-30 Sept., Los Alamitos, CA, USA: IEEE Computer Society
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan, "N-gram-based detection of new malicious code," Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC 2004, 28-30 Sept., Los Alamitos, CA, USA: IEEE Computer Society, pp. 41-42.
-
(2004)
Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC
, pp. 41-42
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
20
-
-
78649845943
-
Detecting trojans using data mining techniques
-
M. Siddiqui, M. Wang, and J. Lee, "Detecting Trojans Using Data Mining Techniques," Wireless Networks, Information Processing and Systems, 2009, pp. 400-411.
-
(2009)
Wireless Networks, Information Processing and Systems
, pp. 400-411
-
-
Siddiqui, M.1
Wang, M.2
Lee, J.3
-
21
-
-
2342663706
-
Virus detection using data mining techniques
-
14-16 Oct. Piscataway, NJ, USA: IEEE
-
J. Wang, P. Deng, Y. Fan, L. Jaw, and Y. Liu, "Virus detection using data mining techniques," Proceedings of International Carnahan Conference on Security Technology, 14-16 Oct. 2003, Piscataway, NJ, USA: IEEE, pp. 71-76.
-
(2003)
Proceedings of International Carnahan Conference on Security Technology
, pp. 71-76
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
-
22
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
17-20 June, Piscataway, NJ, USA: IEEE
-
R. Moskovitch, D. Stopel, C. Feher, N. Nissim, and Y. Elovici, "Unknown malcode detection via text categorization and the imbalance problem," International Conference on Intelligence and Security Informatics, (ISI 2008), 17-20 June, Piscataway, NJ, USA: IEEE, pp. 156-161
-
(2008)
International Conference on Intelligence and Security Informatics, (ISI
, pp. 156-161
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
24
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
22-25 Aug., Seattle, WA, United states: ACM
-
J.Z. Kolter and M.A. Maloof, "Learning to detect malicious executables in the wild", Proceedings of the 10th International Conference on Knowledge Discovery and Data Mining, KDD 2004, 22-25 Aug., Seattle, WA, United states: ACM, pp. 470-478.
-
(2004)
Proceedings of the 10th International Conference on Knowledge Discovery and Data Mining, KDD
, pp. 470-478
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
25
-
-
57749204679
-
New malicious code detection using variable length n-grams
-
D. Reddy, S. Dash, and A. Pujari, "New Malicious Code Detection Using Variable Length n-grams," Information Systems Security, 2006, pp. 276-288.
-
(2006)
Information Systems Security
, pp. 276-288
-
-
Reddy, D.1
Dash, S.2
Pujari, A.3
-
26
-
-
50349090268
-
Cross-validation and bootstrapping are unreliable in small sample classification
-
Oct.
-
Isaksson, M. Wallman, H. Göransson, and M. Gustafsson, "Cross-validation and bootstrapping are unreliable in small sample classification," Pattern Recognition Letters, vol. 29, Oct. 2008, pp. 1960-1965.
-
(2008)
Pattern Recognition Letters
, vol.29
, pp. 1960-1965
-
-
Isaksson, M.1
Göransson, W.H.2
Gustafsson, M.3
-
27
-
-
77952332912
-
-
[accessed 2009-05-17]
-
Download, http://download.com [accessed 2009-05-17].
-
-
-
-
28
-
-
77952417484
-
-
[accessed 2009-04-23]
-
Spyware Guide, http://Spywareguide.com [accessed 2009-04-23].
-
-
-
-
29
-
-
77952417905
-
-
[accessed 2009-04-26]
-
Linux/Unix Command: xxd, http://linux.about.com/library/cmd/blcmdl1-xxd. htm [accessed 2009-04-26].
-
Linux/Unix Command: Xxd
-
-
-
30
-
-
0002900357
-
The case against accuracy estimation for comparing induction algorithms
-
24-27 July, San Francisco, CA, USA: Morgan Kaufmann Publishers
-
F. Provost, T. Fawcett and R. Kohavi.," The Case against Accuracy Estimation for Comparing Induction Algorithms". Proceedings of the Fifteenth international Conference on Machine Learning, ICML 1998, 24-27 July, San Francisco, CA, USA: Morgan Kaufmann Publishers, pp. 445-453.
-
(1998)
Proceedings of the Fifteenth International Conference on Machine Learning, ICML
, pp. 445-453
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
|