-
1
-
-
69249090883
-
-
April
-
Symantec. (2008, April) Symantec internet security threat report. [Online]. Available: http://eval.symantec.com/mktginfo/enterprise/white-papers/ b-whitepaper-internet-security-threat-report-xiii-04-2008.en-us.pdf
-
(2008)
Symantec Internet Security Threat Report
-
-
-
2
-
-
12244311689
-
A taxonomy of computer worms
-
ACM New York, NY, USA
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proceedings of the 2003 ACM workshop on Rapid Malcode. ACM New York, NY, USA, 2003, pp. 11-18.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
3
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, "Semantics-Aware Malware Detection," in Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2005, p. 46.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
4
-
-
84880095176
-
-
Symantec. Malware definition. [Online]. Available: www.symantec.com/ norton/security-response/malware.jsp
-
Malware Definition
-
-
-
5
-
-
56549084673
-
A survey of malware detection techniques
-
Department of Computer Science
-
N. Idika and A. P. Mathur, "A Survey of Malware Detection Techniques," Department of Computer Science, Purdue University, Tech. Rep., 2007.
-
(2007)
Purdue University, Tech. Rep.
-
-
Idika, N.1
Mathur, A.P.2
-
6
-
-
73049094155
-
A survey of data mining techniques for malware detection using file features
-
New York, NY, USA: ACM
-
M. Siddiqui, M. C. Wang, and J. Lee, "A survey of data mining techniques for malware detection using file features," in ACMSE '08. New York, NY, USA: ACM, 2008, pp. 509-510.
-
(2008)
ACMSE '08
, pp. 509-510
-
-
Siddiqui, M.1
Wang, M.C.2
Lee, J.3
-
8
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
IEEE COMPUTER SOCIETY
-
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables," in IEEE Symposium on Security and Privacy. IEEE COMPUTER SOCIETY, 2001, pp. 38-49.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
9
-
-
0030216542
-
Neural networks for computer virus recognition
-
G. Tesauro, J. Kephart, and G. Sorkin, "Neural networks for computer virus recognition," IEEE expert, vol. 11, no. 4, pp. 5-6, 1996.
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
-
10
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," The Journal of Machine Learning Research, vol. 7, p. 2744, 2006.
-
(2006)
The Journal of Machine Learning Research
, vol.7
, pp. 2744
-
-
Kolter, J.1
Maloof, M.2
-
11
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
S. Brin and L. Page, "The anatomy of a large-scale hypertextual Web search engine," Computer networks and ISDN systems, vol. 30, no. 1-7, pp. 107-117, 1998.
-
(1998)
Computer Networks and isDN Systems
, vol.30
, Issue.1
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
12
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
J. Kleinberg, "Authoritative sources in a hyperlinked environment," Journal of the ACM (JACM), vol. 46, no. 5, pp. 604-632, 1999.
-
(1999)
Journal of the ACM (JACM)
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.1
-
13
-
-
85131818719
-
Combating web spam with trustrank
-
Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, "Combating web spam with trustrank," in VLDB '04. VLDB Endowment, 2004, p. 587.
-
(2004)
VLDB '04. VLDB Endowment
, pp. 587
-
-
Gyongyi, Z.1
Garcia-Molina, H.2
Pedersen, J.3
-
14
-
-
36849032888
-
Fast best-effort pattern matching in large attributed graphs
-
H. Tong, C. Faloutsos, B. Gallagher, and T. EliassiRad, "Fast best-effort pattern matching in large attributed graphs," in SIGKDD '07. ACM, 2007, p. 746.
-
(2007)
SIGKDD '07. ACM
, pp. 746
-
-
Tong, H.1
Faloutsos, C.2
Gallagher, B.3
EliassiRad, T.4
-
17
-
-
32344439564
-
Using relational knowledge discovery to prevent securities fraud
-
O. Neville, J. and Şimşek, D. Jensen, J. Komoroske, K. Palmer, and H. Goldberg, "Using relational knowledge discovery to prevent securities fraud," in SIGKDD '05. ACM, 2005, p. 458.
-
(2005)
SIGKDD '05. ACM
, pp. 458
-
-
Neville, O.1
Şimşek, J.2
Jensen, D.3
Komoroske, J.4
Palmer, K.5
Goldberg, H.6
-
18
-
-
37849017546
-
Mining specifications of malicious behavior
-
ACM
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. ACM, 2007, pp. 5-14.
-
(2007)
Proceedings of the The 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
19
-
-
35348860262
-
Netprobe: A fast and scalable system for fraud detection in online auction networks
-
New York, NY, USA: ACM
-
S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos, "Netprobe: a fast and scalable system for fraud detection in online auction networks," in WWW '07. New York, NY, USA: ACM, 2007, pp. 201-210.
-
(2007)
WWW '07
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
20
-
-
70350647577
-
SNARE: A link analytic system for graph labeling and risk detection
-
ACM New York, NY, USA
-
M. McGlohon, S. Bay, M. Anderle, D. Steier, and C. Faloutsos, "SNARE: a link analytic system for graph labeling and risk detection," in SIGKDD '09. ACM New York, NY, USA, 2009, pp. 1265-1274.
-
(2009)
SIGKDD '09
, pp. 1265-1274
-
-
McGlohon, M.1
Bay, S.2
Anderle, M.3
Steier, D.4
Faloutsos, C.5
-
21
-
-
0141695638
-
Understanding belief propagation and its generalizations
-
J. Yedidia, W. Freeman, and Y. Weiss, "Understanding belief propagation and its generalizations," Exploring artificial intelligence in the new millennium, vol. 8, pp. 236-239, 2003.
-
(2003)
Exploring Artificial Intelligence in the New Millennium
, vol.8
, pp. 236-239
-
-
Yedidia, J.1
Freeman, W.2
Weiss, Y.3
-
22
-
-
27944440695
-
Modeling the structure and effectiveness of intelligence organizations: Dynamic information flow simulation
-
R. Behrman and K. Carley, "Modeling the structure and effectiveness of intelligence organizations: Dynamic information flow simulation." in Proceedings of the 8th International Command and Control Research and Technology Symposium., 2003. [Online]. Available: http://www.casos.cs.cmu.edu/ publications/papers/behrman-2003-modelingstructure.pdf
-
(2003)
Proceedings of the 8th International Command and Control Research and Technology Symposium
-
-
Behrman, R.1
Carley, K.2
-
23
-
-
33947235341
-
Suspicion scoring based on guilt-by-association, collective inference, and focused data access
-
June
-
S. A. Macskassy and F. Provost, "Suspicion scoring based on guilt-by-association, collective inference, and focused data access." in Proceedings of the NAACSOS Conference, June 2005.
-
(2005)
Proceedings of the NAACSOS Conference
-
-
Macskassy, S.A.1
Provost, F.2
-
24
-
-
78149333073
-
Gspan: Graph-based substructure pattern mining
-
Washington, DC, USA: IEEE Computer Society
-
X. Yan and J. Han, "gspan: Graph-based substructure pattern mining," in ICDM '02. Washington, DC, USA: IEEE Computer Society, 2002, p. 721.
-
(2002)
ICDM '02
, pp. 721
-
-
Yan, X.1
Han, J.2
-
25
-
-
29844432494
-
Graphminer: A structural pattern-mining system for large disk-based graph databases and its applications
-
ACM
-
W. Wang, C. Wang, Y. Zhu, B. Shi, J. Pei, X. Yan, and J. Han, "Graphminer: a structural pattern-mining system for large disk-based graph databases and its applications," in SIGMOD '05. ACM, 2005, p. 881.
-
(2005)
SIGMOD '05
, pp. 881
-
-
Wang, W.1
Wang, C.2
Zhu, Y.3
Shi, B.4
Pei, J.5
Yan, X.6
Han, J.7
-
26
-
-
32344444324
-
On mining cross-graph quasi-cliques
-
ACM
-
J. Pei, D. Jiang, and A. Zhang, "On mining cross-graph quasi-cliques," in SIGKDD '05. ACM, 2005, p. 238.
-
(2005)
SIGKDD '05
, pp. 238
-
-
Pei, J.1
Jiang, D.2
Zhang, A.3
-
27
-
-
32344434822
-
Mining closed relational graphs with connectivity constraints
-
ACM
-
X. Yan, X. Zhou, and J. Han, "Mining closed relational graphs with connectivity constraints," in SIGKDD '05. ACM, 2005, p. 333.
-
(2005)
SIGKDD '05
, pp. 333
-
-
Yan, X.1
Zhou, X.2
Han, J.3
-
28
-
-
33749560883
-
Coherent closed quasi-clique discovery from large dense graph databases
-
ACM
-
Z. Zeng, J. Wang, L. Zhou, and G. Karypis, "Coherent closed quasi-clique discovery from large dense graph databases," in SIGKDD '06. ACM, 2006, p. 802.
-
(2006)
SIGKDD '06
, pp. 802
-
-
Zeng, Z.1
Wang, J.2
Zhou, L.3
Karypis, G.4
-
29
-
-
33744951081
-
Efficient belief propagation for early vision
-
P. Felzenszwalb and D. Huttenlocher, "Efficient belief propagation for early vision," International journal of computer vision, vol. 70, no. 1, pp. 41-54, 2006.
-
(2006)
International Journal of Computer Vision
, vol.70
, Issue.1
, pp. 41-54
-
-
Felzenszwalb, P.1
Huttenlocher, D.2
-
30
-
-
80052395632
-
Residual splash for optimally parallelizing belief propagation
-
J. Gonzalez, Y. Low, and C. Guestrin, "Residual splash for optimally parallelizing belief propagation." AISTATS, 2009.
-
(2009)
AISTATS
-
-
Gonzalez, J.1
Low, Y.2
Guestrin, C.3
-
31
-
-
77951152705
-
PEGASUS: A peta-scale graph mining system
-
IEEE
-
U. Kang, C. Tsourakakis, and C. Faloutsos, "PEGASUS: A Peta-Scale Graph Mining System," in ICDM '09. IEEE, 2009, pp. 229-238.
-
(2009)
ICDM '09
, pp. 229-238
-
-
Kang, U.1
Tsourakakis, C.2
Faloutsos, C.3
|