-
1
-
-
33749252873
-
-
MIT Press, Cambridge
-
Chapelle, O., Scḧolkopf, B., Zien, A.: Semi-supervised learning. MIT Press, Cambridge (2006)
-
(2006)
Semi-supervised Learning
-
-
Chapelle, O.1
Scḧolkopf, B.2
Zien, A.3
-
3
-
-
70349448915
-
Renovo: A hidden code extractor for packed executables
-
Kang, M., Poosankam, P., Yin, H.: Renovo: A hidden code extractor for packed executables. In: Proceedings of the 2007 ACMWorkshop on Recurring Malcode, pp. 46-53 (2007)
-
(2007)
Proceedings of the 2007 ACMWorkshop on Recurring Malcode
, pp. 46-53
-
-
Kang, M.1
Poosankam, P.2
Yin, H.3
-
5
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
Martignoni, L., Christodorescu, M., Jha, S.: Omniunpack: Fast, generic, and safe unpacking of malware. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), pp. 431-441 (2007)
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
8
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y.: Unknown malcode detection via text categorization and the imbalance problem. In: Proceedings of the 6th IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 156-161 (2008)
-
(2008)
Proceedings of the 6th IEEE International Conference on Intelligence and Security Informatics (ISI)
, pp. 156-161
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
9
-
-
52149092178
-
The evolution of commercial malware development kits and colour-bynumbers custom malware
-
Ollmann, G.: The evolution of commercial malware development kits and colour-bynumbers custom malware. Computer Fraud & Security 2008(9), 4-7 (2008)
-
(2008)
Computer Fraud & Security
, vol.2008
, Issue.9
, pp. 4-7
-
-
Ollmann, G.1
-
10
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
Royal, P., Halpin, M., Dagon, D., Edmonds, R., Lee, W.: Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In: Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), pp. 289-300 (2006)
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
11
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
Massacci, F., Wallach, D., Zannone, N. (eds.), ESSoS 2010 Springer, Heidelberg
-
Santos, I., Brezo, F., Nieves, J., Penya, Y.K., Sanz, B., Laorden, C., Bringas, P.G.: Idea: Opcode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 35-43. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5965
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, Y.K.4
Sanz, B.5
Laorden, C.6
Bringas, P.G.7
-
12
-
-
74549138307
-
N-Grams-based file signatures for malware detection
-
Santos, I., Penya, Y., Devesa, J., Bringas, P.: N-Grams-based file signatures for malware detection. In: Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS). AIDSS, pp. 317-320 (2009)
-
(2009)
Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS). AIDSS
, pp. 317-320
-
-
Santos, I.1
Penya, Y.2
Devesa, J.3
Bringas, P.4
-
13
-
-
0037806811
-
The boosting approach to machine learning: An overview
-
Schapire, R.: The boosting approach to machine learning: An overview. Lecture Notes in Statistics pp. 149-172 (2003)
-
(2003)
Lecture Notes in Statistics
, pp. 149-172
-
-
Schapire, R.1
-
14
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the 22nd IEEE Symposium on Security and Privacy, pp. 38-49 (2001) (Pubitemid 32882625)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
15
-
-
49949094798
-
Embedded malware detection using markov n-grams
-
Zamboni, D. (ed.), DIMVA 2008 Springer, Heidelberg
-
Zubair Shafiq, M., Khayam, S.A., Farooq, M.: Embedded malware detection using markov n-grams. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 88-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 88-107
-
-
Zubair Shafiq, M.1
Khayam, S.A.2
Farooq, M.3
-
16
-
-
57049186367
-
Eureka: A framework for enabling static malware analysis
-
Jajodia, S., Lopez, J. (eds.), ESORICS 2008 Springer, Heidelberg
-
Sharif, M., Yegneswaran, V., Saidi, H., Porras, P.A., Lee, W.: Eureka: A framework for enabling static malware analysis. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 481-500. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 481-500
-
-
Sharif, M.1
Yegneswaran, V.2
Saidi, H.3
Porras, P.A.4
Lee, W.5
-
17
-
-
67650330214
-
Comparative analysis of regression and machine learning methods for predicting fault proneness models
-
Singh, Y., Kaur, A.,Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology 35(2), 183-193 (2009)
-
(2009)
International Journal of Computer Applications in Technology
, vol.35
, Issue.2
, pp. 183-193
-
-
Singh, Y.1
Kaur, A.2
Malhotra, R.3
-
18
-
-
84899006908
-
Learning with local and global consistency
-
Zhou, D., Bousquet, O., Lal, T.,Weston, J., Scḧolkopf, B.: Learning with local and global consistency. In: Advances in Neural Information Processing Systems 16: Proceedings of the 2003 Conference, pp. 595-602 (2004)
-
(2004)
Advances in Neural Information Processing Systems 16: Proceedings of the 2003 Conference
, pp. 595-602
-
-
Zhou, D.1
Bousquet, O.2
Lal, T.3
Weston, J.4
Scḧolkopf, B.5
-
19
-
-
70349232273
-
Malware detection using adaptive data compression
-
ACM, New York
-
Zhou, Y., Inge, W.: Malware detection using adaptive data compression. In: Proceedings of the 1st ACM Workshop on AISec, pp. 53-60. ACM, New York (2008)
-
(2008)
Proceedings of the 1st ACM, Workshop on AISec
, pp. 53-60
-
-
Zhou, Y.1
Inge, W.2
|