메뉴 건너뛰기




Volumn , Issue , 2010, Pages 45-60

Synthesizing near-optimal malware specifications from suspicious behaviors

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; AUTOMATIC TECHNIQUE; BEHAVIOR-BASED; BEHAVIOR-BASED DETECTION; CONCEPT ANALYSIS; DETECTION RATES; FALSE POSITIVE; GRAPH MINING; LARGE CLASS; MALICIOUS BEHAVIOR; MALWARES; NUMBER OF FALSE ALARMS; OPEN SOURCES; PROBABILISTIC SAMPLING;

EID: 77955210614     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.11     Document Type: Conference Paper
Times cited : (192)

References (41)
  • 2
    • 77955225451 scopus 로고    scopus 로고
    • Here comes the flood or end of the pattern file
    • Ottawa
    • D. Perry, "Here comes the flood or end of the pattern file," in Virus Bulletin (VB2008), Ottawa, 2008.
    • (2008) Virus Bulletin (VB2008)
    • Perry, D.1
  • 9
    • 0000398336 scopus 로고
    • Restructuring lattice theory: An approach based on hierarchies of concepts
    • R. Wille, "Restructuring lattice theory: an approach based on hierarchies of concepts," Ordered Sets, 1982.
    • (1982) Ordered Sets
    • Wille, R.1
  • 13
    • 77955197991 scopus 로고    scopus 로고
    • "Symantec security response," http://www.symantec.com/business/ security-response/index.jsp.
  • 17
    • 0009793176 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation, "MSDN Library," http: //msdn.microsoft.com/en-us/library/default.aspx.
    • MSDN Library
  • 19
    • 0033328495 scopus 로고    scopus 로고
    • A fast algorithm for building lattices
    • L. Nourine and O. Raynaud, "A fast algorithm for building lattices," Inf. Process. Lett., vol. 71, no. 5-6, pp. 199-204, 1999.
    • (1999) Inf. Process. Lett. , vol.71 , Issue.5-6 , pp. 199-204
    • Nourine, L.1    Raynaud, O.2
  • 20
    • 31844436472 scopus 로고    scopus 로고
    • BindView, "Strace for NT," http://www.bindview.com.
    • Strace for NT
  • 24
    • 77955202624 scopus 로고    scopus 로고
    • "Top internet security suites: Paying for protection
    • January
    • E. Larkin, "Top internet security suites: Paying for protection," PC Magazine, January 2009.
    • (2009) PC Magazine
    • Larkin, E.1
  • 31
    • 67650401454 scopus 로고    scopus 로고
    • Ph.D. dissertation, Technischen Universitat Darmstadt, Darmstadt, Germany, Oct.
    • S. Yevtushenko, "Computing and visualizing concept lattices," Ph.D. dissertation, Technischen Universitat Darmstadt, Darmstadt, Germany, Oct. 2004.
    • (2004) Computing and Visualizing Concept Lattices
    • Yevtushenko, S.1
  • 40
    • 0035307244 scopus 로고    scopus 로고
    • Concept analysis for module restructuring
    • P. Tonella, "Concept analysis for module restructuring," IEEE Transactions on Software Engineering, vol. 27, no. 4, pp. 351-363, 2001.
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.4 , pp. 351-363
    • Tonella, P.1
  • 41
    • 0041848279 scopus 로고    scopus 로고
    • Using a concept lattice of decomposition slices for program understanding and impact analysis
    • -, "Using a concept lattice of decomposition slices for program understanding and impact analysis," IEEE Transactions on Software Engineering, vol. 29, no. 6, pp. 495-509, 2003.
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.6 , pp. 495-509


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.