-
2
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, andL. Bier. Clone detection using abstract syntax trees. In Proceedings of International Conference on Software Maintenance, pages 368-377, 1998.
-
(1998)
Proceedings of International Conference on Software Maintenance
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
3
-
-
0031628588
-
Macro virus identification problems
-
V. Bontchev. Macro virus identification problems. Computers and Security, 17(1):69-89, 1998.
-
(1998)
Computers and Security
, vol.17
, Issue.1
, pp. 69-89
-
-
Bontchev, V.1
-
8
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, andK. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
11
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. J. Ottenstein, andJ. D. Warren. The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems, 9(3):319-349, 1987.
-
(1987)
ACM Transactions on Programming Languages and Systems
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
12
-
-
33749559863
-
GPLAG: Detection of software plagiarism by program dependence graph analysis
-
C. Liu, C. Chen, J. Han, andP. S. Yu. GPLAG: detection of software plagiarism by program dependence graph analysis. In KDD '06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 872-881, 2006.
-
(2006)
KDD '06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.S.4
-
13
-
-
72749097884
-
Evolvable malware
-
S. Noreen, S. Murtaza, M. Z. Shafiq, andM. Farooq. Evolvable malware. In GECCO '09: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pages 1569-1576, 2009.
-
(2009)
GECCO '09: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation
, pp. 1569-1576
-
-
Noreen, S.1
Murtaza, S.2
Shafiq, M.Z.3
Farooq, M.4
-
14
-
-
76649137566
-
Using formal grammar and genetic operators to evolve malware
-
RAID: 12th International Symposium On Recent Advances In Intrusion Detection
-
S. Noreen, S. Murtaza, M. Z. Shafiq, andM. Farooq. Using formal grammar and genetic operators to evolve malware. In RAID: 12th International Symposium On Recent Advances In Intrusion Detection, volume 5758 of Lecture Notes in Computer Science, pages 374-375, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5758
, pp. 374-375
-
-
Noreen, S.1
Murtaza, S.2
Shafiq, M.Z.3
Farooq, M.4
-
16
-
-
0034838197
-
Data mining methods for detection of new malicious exécutables
-
M. G. Schultz, E. Eskin, E. Zadok, andS. J. Stolfo. Data mining methods for detection of new malicious exécutables. In SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy, page 38, 2001.
-
SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, vol.2001
, pp. 38
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
18
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J. Kephart, andG. Sorkin. Neural networks for computer virus recognition. IEEE Expert, 11(4):5-6, 1996.
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
|