-
1
-
-
33746864380
-
Detection of new malicious code using n-grams signatures
-
Brunswick, Canada; Oct.
-
Abou-Assaleh T, Cercone N, Keselj V. Detection of new malicious code using n-grams signatures. In: Proceedings of second annual conference on privacy, security and trust, Brunswick, Canada; Oct. 2004a. p. 193-198.
-
(2004)
Proceedings of Second Annual Conference on Privacy, Security and Trust
, pp. 193-198
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
-
3
-
-
33751052185
-
Static detection of malicious code in executable programs
-
Indianapolis, Indiana, USA; March
-
Bergeron J, Debbabi M, Desharnais J, Erhioui MM, Lavoie Y, Tawbi N. Static detection of malicious code in executable programs. In: Symposium on requirements engineering for information security (SREIS'01), Indianapolis, Indiana, USA; March 2001. p. 157-166.
-
(2001)
Symposium on Requirements Engineering for Information Security (SREIS'01)
, pp. 157-166
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
4
-
-
27544465088
-
Anomaly intrusion detection for system call using the soundex algorithm and neural networks
-
Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
-
Cha BR, Vaidya B, Han S. Anomaly intrusion detection for system call using the Soundex algorithm and neural networks. In: 10th IEEE symposium on computer and communications, Cartagena, Murcia, Spain; June 2005. p. 427-433. (Pubitemid 41543309)
-
(2005)
Proceedings - IEEE Symposium on Computers and Communications
, pp. 427-433
-
-
Cha, B.1
Vaidya, B.2
Han, S.3
-
5
-
-
33646822481
-
Episode based masquerade detection
-
DOI 10.1007/11593980-19, Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
Dash SK, Reddy KS, Pujari AK. Episode based Masquerade detection. In: Proceedings of 1st International conference on information systems security, Kolkata, India; December 2005. p. 251-262. (Pubitemid 43775412)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3803
, pp. 251-262
-
-
Dash, S.K.1
Reddy, K.S.2
Pujari, A.K.3
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, USA; May
-
Forrest S, Hofmeyr SA, Somayaji A, Longstaf TA. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE symposium on computer security and privacy, Oakland, USA; May 1996. p. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaf, T.A.4
-
8
-
-
80051792443
-
-
(accessed 23.03.10)
-
S.A. Hex-Rays IDA pro introduction 2009 Available from: http://www.hex-rays.com/products.shtml/ (accessed 23.03.10)
-
(2009)
IDA Pro Introduction
-
-
Hex-Rays, S.A.1
-
10
-
-
24944517527
-
Learning classifiers for misuse detection using a bag of system calls representation
-
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
-
Kang DK, Fuller D, Honavar V. Learning classifiers for Misuse and anomaly detection using a Bag of system calls representation. In: Workshop on information assurance and security United States military academy, West Point, NY; June 2005. p. 511-516. (Pubitemid 41314466)
-
(2005)
Lecture Notes in Computer Science
, vol.3495
, pp. 511-516
-
-
Kang, D.-K.1
Fuller, D.2
Honavar, V.3
-
11
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J.Z. Kolter, and M.A. Maloof Learning to detect and classify malicious executables in the wild Journal of Machine Learning Research 7 2006 2721 2744 (Pubitemid 46011490)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
14
-
-
80051780701
-
-
netlux.org (accessed 23.03.10)
-
netlux.org Malicious code samples 2009 Available from: http://vx.netlux.org/ (accessed 23.03.10)
-
(2009)
Malicious Code Samples
-
-
-
15
-
-
84902268375
-
-
(accessed 23.03.10)
-
Offensive Computing Malicious code samples 2005 Available from: http://www.offensivecomputing.net/ (accessed 23.03.10)
-
(2005)
Malicious Code Samples
-
-
Computing, O.1
-
16
-
-
84888868663
-
-
Peid (accessed 23.3.10)
-
Peid Peid v0.94 Available From: 2007 http://www.peid.info/ (accessed 23.3.10)
-
(2007)
Peid v0.94
-
-
-
18
-
-
33751168025
-
N-gram analysis for computer virus detection
-
DOI 10.1007/s11416-006-0027-8
-
D.K.S. Reddy, and A.K. Pujari N-gram analysis for new computer virus detection Journal in Computer Virology 2 3 2006 231 239 (Pubitemid 44777788)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.3
, pp. 231-239
-
-
Reddy, D.K.S.1
Pujari, A.K.2
-
20
-
-
21644475665
-
Static analyzer of vicious executables
-
Tucson, USA; Dec.
-
Sung AH, Xu J, Chavez P, Mukkamala S. Static analyzer of vicious executables. In: Proceedings of the 20th annual computer security applications conference (ACSAC), Tucson, USA; Dec. 2004. p. 326-334.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC)
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
21
-
-
34548147746
-
Process profiling using frequencies of system calls
-
DOI 10.1109/ARES.2007.116, 4159838, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007
-
Varghese SM, Jacob KP. Process profiling using frequencies of system calls. In: The second international conference on availability, reliability and security, Vienna Austria; April 2007. p. 473-479. (Pubitemid 47304251)
-
(2007)
Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007
, pp. 473-479
-
-
Varghese, S.M.1
Jacob, K.P.2
-
22
-
-
33845397865
-
Native API based windows anomaly intrusion detection method using SVM
-
Taiwan; June
-
Wang M, Zheng C, Yu JJ. Native API based windows anomaly intrusion detection method using SVM. In: Proceedings of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, Taiwan; June 2006. p. 514-519.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 514-519
-
-
Wang, M.1
Zheng, C.2
Yu, J.J.3
-
23
-
-
54849412646
-
An intelligent PE-Malware detection system based on association mining
-
Y.F. Ye, D.D. Wang, and T. Li An intelligent PE-Malware detection system based on association mining Journal in Computer Virology 4 4 2008 323 334
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.F.1
Wang, D.D.2
Li, T.3
-
24
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D.Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognition 36 1 2003 229 243
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
25
-
-
56549097799
-
High-order Markov kernels for intrusion detection
-
C. Yin, S. Tian, and S. Mu High-order Markov kernels for intrusion detection Neurocomputing 71 2008 3247 3252
-
(2008)
Neurocomputing
, vol.71
, pp. 3247-3252
-
-
Yin, C.1
Tian, S.2
Mu, S.3
-
26
-
-
80051782858
-
Unknown malicious code detection based on rough set theory and support vector machine
-
Vancouver, Canada; July
-
Zhang BY, Yin JP, Tang WS, Hao JB, Zhang DX. Unknown malicious code detection based on rough set theory and support vector machine. In: 2006 international joint conference on neural networks, Vancouver, Canada; July 2006. p. 16-21.
-
(2006)
2006 International Joint Conference on Neural Networks
, pp. 16-21
-
-
Zhang, B.Y.1
Yin, J.P.2
Tang, W.S.3
Hao, J.B.4
Zhang, D.X.5
|