-
1
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., E. Eskin, E. Zadok and S.J. Stolfo, "Data Mining Methods for Detection of New Malicious Executables", In Proceeding of the 2001 IEEE Symp on Security and Privacy, pp.38-49, 2001.
-
(2001)
Proceeding of the 2001 IEEE Symp on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
2
-
-
79952776541
-
Unknown computer virus detection inspired by immunity
-
Zhang, Y., T. Li and R. Qin, "Unknown computer virus detection inspired by immunity", Journal of Frontiers of Computer Science and Technology, vol. 3, no. 2, pp.154-161, 2009.
-
(2009)
Journal of Frontiers of Computer Science and Technology
, vol.3
, Issue.2
, pp. 154-161
-
-
Zhang, Y.1
Li, T.2
Qin, R.3
-
3
-
-
77949889062
-
Immune-based approach for detection of unknown windows virus
-
Zhang, Y., L. Tao, W.L. Hua and X. Feng, "Immune-based approach for detection of unknown windows virus", Journal of University of Electronic Science and Technology of China, vol. 39, no. 1, pp.80-84, 2010.
-
(2010)
Journal of University of Electronic Science and Technology of China
, vol.39
, Issue.1
, pp. 80-84
-
-
Zhang, Y.1
Tao, L.2
Hua, W.L.3
Feng, X.4
-
4
-
-
33751168025
-
N-gram analysis for computer virus detection
-
Reddy, D.K.S. and A.K. Pujari, "N-gram analysis for computer virus detection", Journal in Computer Virology, vol. 3, no. 2, pp.231-239, 2006.
-
(2006)
Journal in Computer Virology
, vol.3
, Issue.2
, pp. 231-239
-
-
Reddy, D.K.S.1
Pujari, A.K.2
-
5
-
-
33744948585
-
Unknown computer virus detection based on multi-naive Bayes algorithm
-
Bo-yun, Z., Y. Jian-ping, G. Jing-bo, D. Zhang and S. Wang, "Unknown computer virus detection based on multi-naive Bayes algorithm", Computer Engineering, vol. 32, no. 10,pp.18-21, 2006.
-
(2006)
Computer Engineering
, vol.32
, Issue.10
, pp. 18-21
-
-
Bo-Yun, Z.1
Jian-Ping, Y.2
Jing-Bo, G.3
Zhang, D.4
Wang, S.5
-
6
-
-
68749099128
-
Unknown virus detection based on API sequence and support vector machine
-
Shuo, W., Z. Ji-liu and P. Bo, "Unknown virus detection based on API sequence and support vector machine",Journal of Computer Applications,vol.27,no.8,pp.1942-1943, 2007.
-
(2007)
Journal of Computer Applications
, vol.27
, Issue.8
, pp. 1942-1943
-
-
Shuo, W.1
Ji-Liu, Z.2
Bo, P.3
-
8
-
-
24944582622
-
A functional taxonomy for software watermarking
-
Nagra, J., C. Thomborson and C. Collberg, "A functional taxonomy for software watermarking", In Proceedings of the 25th Australasian Computer Science Conference, pp.208-216, 2002.
-
(2002)
Proceedings of the 25th Australasian Computer Science Conference
, pp. 208-216
-
-
Nagra, J.1
Thomborson, C.2
Collberg, C.3
-
9
-
-
24944448918
-
-
Technical Report TR04-08, University of Arizona, Arizona
-
Collberg, C., C. Thomborson and G. Townsend, "Dynamic graph-based software watermarking",Technical Report TR04-08, University of Arizona, Arizona, 2004.
-
(2004)
Dynamic Graph-based Software Watermarking
-
-
Collberg, C.1
Thomborson, C.2
Townsend, G.3
-
10
-
-
24944463250
-
A survey of software watermarking
-
Zhu, W., C. Thomborson and F.Y. Wang, "A survey of software watermarking", In Proceedings of the Intelligence and Security Informatics, pp. 454-458, 2005.
-
(2005)
In Proceedings of the Intelligence and Security Informatics
, pp. 454-458
-
-
Zhu, W.1
Thomborson, C.2
Wang, F.Y.3
-
12
-
-
56649105053
-
More on graph theoretic software watermarks: Implementation, analysis, and attacks
-
Collberg, C., A. Huntwork, E. Carter, G. Townsend, and M. Stepp, "More on graph theoretic software watermarks: Implementation, analysis, and attacks", Information and Software Technology, vol. 51,no.1,pp.56-67,2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.1
, pp. 56-67
-
-
Collberg, C.1
Huntwork, A.2
Carter, E.3
Townsend, G.4
Stepp, M.5
-
13
-
-
52049125166
-
Peering inside the PE: A tour of the Win32 portable executable file format
-
[Accessed 10 December, 2010]
-
Pietrek, M., Peering inside the PE: A tour of the Win32 portable executable file format. Microsoft Syst. J., 9:15-34,1994. http://msdn.microsoft.com/en-us/magazine/cc301805.aspx. [Accessed 10 December, 2010].
-
(1994)
Microsoft Syst. J.
, vol.9
, pp. 15-34
-
-
Pietrek, M.1
-
15
-
-
79952780836
-
Sub-connection Based Isolation Against Network Virus
-
Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou, "Sub-connection Based Isolation Against Network Virus", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 3, No. 1, pp. 110-122, 2009.
-
(2009)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.3
, Issue.1
, pp. 110-122
-
-
Han, L.1
Liu, M.2
Liu, Q.3
Zou, M.4
-
16
-
-
78651568950
-
Copyright protecting using the secure visible removable watermarking in JPEG compression
-
Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang, "Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression ", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 4, No. 8, pp. 34-42, 2010.
-
(2010)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.8
, pp. 34-42
-
-
Li, H.1
Liu, G.2
Dai, Y.3
Wang, Z.4
-
17
-
-
78651563693
-
An intelligent distributed intrusion detection system using genetic algorithm
-
S. Janakiraman, V. Vasudevan, "An Intelligent Distributed Intrusion Detection System using Genetic Algorithm", JCIT: Journal of Convergence Information Technology, Vol. 4, No. 1, pp. 70-76, 2009.
-
(2009)
JCIT: Journal of Convergence Information Technology
, vol.4
, Issue.1
, pp. 70-76
-
-
Janakiraman, S.1
Vasudevan, V.2
|