-
2
-
-
85161649278
-
-
[Online]. Available
-
F-secure: Silent growth of malware accelerates. [Online]. Available: http://www.f-secure.com/en-EMEA/security/security-lab/latest-threats/se curity-threat-summaries/2008-2.html
-
Silent Growth of Malware Accelerates.
-
-
-
3
-
-
52149092178
-
The evolution of commercial malware development kits and colour-by-numbers custom malware
-
G. Ollmann, "The evolution of commercial malware development kits and colour-by-numbers custom malware," Computer Fraud & Security, vol. 9, 2008.
-
(2008)
Computer Fraud & Security
, vol.9
-
-
Ollmann, G.1
-
4
-
-
85038523591
-
-
[Online]. Available
-
T. Kojm. (2008). Introduction to ClamAV. [Online]. Available: http:// www.clamav.net/doc/webinars/Webinar-TK-2008-06-11 .pdf
-
(2008)
Introduction to ClamAV.
-
-
Kojm, T.1
-
5
-
-
74049111426
-
Hash-AV: Fast virus signature scanning by cacheresident filters
-
O. Erdogan and P. Cao, "Hash-AV: Fast virus signature scanning by cacheresident filters," Int. J. Security Netw., vol. 50, no. 2, 2007.
-
(2007)
Int. J. Security Netw.
, vol.50
, Issue.2
-
-
Erdogan, O.1
Cao, P.2
-
6
-
-
84875615876
-
Exact pattern matching with feed-forward bloom filters
-
I. Moraru and D. G. Andersen, "Exact pattern matching with feed-forward bloom filters," in Proc. ALENEX, 2011.
-
(2011)
Proc. ALENEX
-
-
Moraru, I.1
Andersen, D.G.2
-
8
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang, "Effective and efficient malware detection at the end host," in Proc. USENIX, 2009.
-
(2009)
Proc. USENIX
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
9
-
-
85161665971
-
-
[Online]. Available
-
T. Kojm. Clamav. [Online]. Available: http://www.clamav.net
-
-
-
Kojm, T.1
-
10
-
-
77955099121
-
Profiling and accelerating string matching algorithms in three network content security applications
-
Apr.
-
P.-C. Lin, Z.-X. Li, Y.-D. Lin, Y.-C. Lai, and F. Lin, "Profiling and accelerating string matching algorithms in three network content security applications," IEEE Commun. Surveys Tuts., vol. 8, pp. 24-37, Apr. 2006.
-
(2006)
IEEE Commun. Surveys Tuts., Vol.
, vol.8
, pp. 24-37
-
-
Lin, P.-C.1
Li, Z.-X.2
Lin, Y.-D.3
Lai, Y.-C.4
Lin, F.5
-
11
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. V. Aho and M. J. Corasick, "Efficient string matching: An aid to bibliographic search," Commun., of the ACM, vol. 18, pp. 333-340, 1975.
-
(1975)
Commun., of the ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
13
-
-
0017547820
-
A fast string searching algorithm
-
R. S. Boyer and J. S. Moore, "A fast string searching algorithm," Commun. of the ACM, vol. 20, pp. 762-772, 1977.
-
(1977)
Commun. of the ACM
, vol.20
, pp. 762-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun, of the ACM, vol. 13, pp. 422-426, 1970.
-
(1970)
Commun, of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
16
-
-
0022030599
-
Efficient randomized pattern-matching algorithms
-
R. M. Karp and M. O. Rabin, "Efficient randomized pattern-matching algorithms," IBM J. Research and Development, vol. 31, no. 2, pp. 249-260, 1987.
-
(1987)
IBM J. Research and Development
, vol.31
, Issue.2
, pp. 249-260
-
-
Karp, R.M.1
Rabin, M.O.2
-
17
-
-
85161666874
-
-
[Online]. Available
-
S. Ballmer. (2007). [Online]. Available: http://www.microsoft.com/msft/ speech/FY07/BallmerFAM2007.mspx
-
(2007)
-
-
Ballmer, S.1
-
19
-
-
84857164924
-
Soundminer: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundminer: A stealthy and context-aware sound trojan for smartphones," in Proc. 18th Ann. Netw. Distributed Syst. Security Symp., 2011.
-
(2011)
Proc. 18th Ann. Netw. Distributed Syst. Security Symp.
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
20
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta, "On cellular botnets: Measuring the impact of malicious devices on a cellular network core," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp 223-234.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
La Porta, T.7
-
21
-
-
0031177375
-
Recursive hashing functions for n-grams
-
J. D. Cohen, "Recursive hashing functions for n-grams," ACM Trans. Inf. Syst., vol. 15, no. 3, pp. 291-320, 1997.
-
(1997)
ACM Trans. Inf. Syst.
, vol.15
, Issue.3
, pp. 291-320
-
-
Cohen, J.D.1
-
22
-
-
52349121903
-
Less hashing, same performance: Building a better Bloom filter
-
A. Kirsch and M. Mitzenmacher, "Less hashing, same performance: Building a better Bloom filter," Random Structures & Algorithms, vol. 33, no. 2, pp. 187-218, 2008.
-
(2008)
Random Structures & Algorithms
, vol.33
, Issue.2
, pp. 187-218
-
-
Kirsch, A.1
Mitzenmacher, M.2
-
23
-
-
33746890192
-
Snort offloader: A reconfigurable hardware NIDS filter
-
1515770, Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
-
H. Song, T. Sproull, M. Attig, and J. Lockwood, "Snort offloader: A reconfigurable hardware NIDS filter," Int. Conf. Field Programmable Logic and Applications, 2005., pp. 493-498, 2005. (Pubitemid 44183480)
-
(2005)
Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
, vol.2005
, pp. 493-498
-
-
Song, H.1
Sproull, T.2
Attig, M.3
Lockwood, J.4
-
24
-
-
1842478680
-
Deep packet inspection using parallel Bloom filters
-
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, "Deep packet inspection using parallel Bloom filters," IEEE Micro, vol. 24, pp. 52-61, Jan. 2004.
-
(2004)
IEEE Micro
, vol.24
, pp. 52-61
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
25
-
-
77952924818
-
Efficient signature based malware detection on mobile devices
-
D. Venugopal and G. Hu, "Efficient signature based malware detection on mobile devices," Mobile Inf. Syst., vol. 4, no. 1, pp. 33-49, 2008.
-
(2008)
Mobile Inf. Syst.
, vol.4
, Issue.1
, pp. 33-49
-
-
Venugopal, D.1
Hu, G.2
-
26
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, X. Hu, K. G. Shin, and T Park, "Behavioral detection of malware on mobile handsets," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, 2008, pp. 225-238.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl., Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
27
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
Springer Berlin/Heidelberg
-
L. Liu, G. Yan, X. Zhang, and S. Chen, "Virusmeter: Preventing your cellphone from spies," in Recent Advances in Intrusion Detection, vol. 5758 of Lecture Notes in Computer Science, pp. 244-264. Springer Berlin/Heidelberg, 2009.
-
(2009)
Recent Advances in Intrusion Detection, Vol. 5758 of Lecture Notes in Computer Science
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
28
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
New York, USA
-
H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants " in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, New York, USA, 2008, pp. 239-252.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl., Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
29
-
-
85084164499
-
AVFS: An on-access anti-virus file system
-
Y. Miretskiy, A. Das, C. P. Wright, and E. Zadok, "AVFS: An on-access anti-virus file system," in Proc. 13th USENIX Security Symp., 2004.
-
(2004)
Proc. 13th USENIX Security Symp.
-
-
Miretskiy, Y.1
Das, A.2
Wright, C.P.3
Zadok, E.4
-
30
-
-
85092638207
-
FAWNdamentally power-efficient clusters
-
V. Vasudevan, J. Franklin, D. Andersen, A. Phanishayee, L. Tan, M. Kaminsky, and I. Moraru, "FAWNdamentally power-efficient clusters," in Proc. 12th Workshop on Hot Topics in Operating Syst., 2009.
-
(2009)
Proc. 12th Workshop on Hot Topics in Operating Syst.
-
-
Vasudevan, V.1
Franklin, J.2
Andersen, D.3
Phanishayee, A.4
Tan, L.5
Kaminsky, M.6
Moraru, I.7
|