-
2
-
-
77953238048
-
Sizing Up the Malware Threat - Key Malware Trends for 2010
-
G. Cluley, "Sizing Up The Malware Threat - Key Malware Trends for 2010," Network Security, vol. 2010, no. 4, pp. 8-10.
-
Network Security
, vol.2010
, Issue.4
, pp. 8-10
-
-
Cluley, G.1
-
3
-
-
80053969119
-
Security Fix - Massive Profits Fueling Rogue Antivirus Market
-
[Online]. Available: Accessed: 13-Jan-2011
-
The Washington Post, "Security Fix - Massive Profits Fueling Rogue Antivirus Market." [Online]. Available: http://voices.washingtonpost.com/ securityfix/2009/03/obscene-profits-fuel-rogue-ant.html?wprss=securityfix. [Accessed: 13-Jan-2011].
-
The Washington Post
-
-
-
4
-
-
80053972634
-
-
Available: Accessed: 13-Jul-2010
-
Lavasoft AB, "Lavasoft." [Online]. Available: http://www.lavasoft.com/. [Accessed: 13-Jul-2010].
-
"Lavasoft." [Online]
-
-
-
5
-
-
78249283520
-
An Analysis of Rogue AV Campaigns
-
M. Cova, C. Leita, O. Thonnard, A. Keromytis, and M. Dacier, "An Analysis of Rogue AV Campaigns," in Recent Advances in Intrusion Detection, pp. 442-463.
-
Recent Advances in Intrusion Detection
, pp. 442-463
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
6
-
-
85084096558
-
The Nocebo Effect on the Web: An Analysis of Fake Anti-virus Distribution
-
M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao, "The Nocebo Effect on The Web: An Analysis of Fake Anti-virus Distribution," in Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more (LEET 10), 2010, pp. 3-3.
-
Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (LEET 10), 2010
, pp. 3-3
-
-
Rajab, M.A.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Zhao, X.5
-
9
-
-
80053953973
-
-
Available: Accessed: 20-Jan-2011
-
Symantec Corporation, "Symantec Report on Rogue Security Software Press Kit." [Online]. Available: http://www.symantec.com/about/news/ resources/press-kits/detail.jsp?pkid=istr-rogue-security. [Accessed: 20-Jan-2011].
-
"Symantec Report on Rogue Security Software Press Kit." [Online]
-
-
-
10
-
-
80053940317
-
-
Available: Accessed: 24-Jun-2011
-
"Aftonbladet." [Online]. Available: http://www.aftonbladet.se/ nyheter/article13218796.ab. [Accessed: 24-Jun-2011].
-
"Aftonbladet." [Online]
-
-
-
12
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
M. G. Schultz, E. Eskin, F. Zadok, and S. J. Stolfo, "Data Mining Methods for Detection of New Malicious Executables," in Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), pp. 38-49.
-
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, F.3
Stolfo, S.J.4
-
13
-
-
65749105726
-
Malware Signature Builder and Detection for Executable Code
-
U.S. Patent EP2189920
-
S. Dolev and N. Tzachar, "Malware Signature Builder and Detection for Executable Code," U.S. Patent EP2189920.
-
-
-
Dolev, S.1
Tzachar, N.2
-
14
-
-
0016572913
-
A Vector Space Model for Automatic Indexing
-
G. Salton, A. Wong, and C. S. Yang, "A Vector Space Model for Automatic Indexing," Communications of the ACM, vol. 18, pp. 613-620.
-
Communications of the ACM
, vol.18
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.S.3
-
17
-
-
33745686236
-
Disassembled Code Analyzer for Malware (DCAM)
-
A. Sulaiman, K. Ramamoorthy, S. Mukkamala, and A. H. Sung, "Disassembled Code Analyzer for Malware (DCAM)," in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI-2005), 2005, pp. 398-403.
-
(2005)
Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI-2005)
, pp. 398-403
-
-
Sulaiman, A.1
Ramamoorthy, K.2
Mukkamala, S.3
Sung, A.H.4
-
18
-
-
2342663706
-
Virus Detection using Data Mining Techinques
-
Jau-Hwang Wang, P. S. Deng, Yi-Shen Fan, Li-Jing Jaw, and Yu-Ching Liu, "Virus Detection using Data Mining Techinques," in Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, 2003, pp. 71-76.
-
Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, 2003
, pp. 71-76
-
-
Wang, J.-H.1
Deng, P.S.2
Fan, Y.-S.3
Jaw, L.-J.4
Liu, Y.-C.5
-
20
-
-
77952339517
-
Detection of Spyware by Mining Executable Files
-
R. K. Shahzad, S. I. Haider, and N. Lavesson, "Detection of Spyware by Mining Executable Files," in Proceedings of the International Conference on Availability, Reliability, and Security (ARES 10), 2010, pp. 295-302.
-
Proceedings of the International Conference on Availability, Reliability, and Security (ARES 10), 2010
, pp. 295-302
-
-
Shahzad, R.K.1
Haider, S.I.2
Lavesson, N.3
-
21
-
-
80054005503
-
-
Available: Accessed: 02-Jan-2010
-
CNET, "Free Software Downloads." [Online]. Available: http://download.cnet.com/. [Accessed: 02-Jan-2010].
-
"Free Software Downloads." [Online]
-
-
-
27
-
-
0346212365
-
Machine Learning of Rules and Trees
-
Ellis Horwood
-
C. Feng and D. Michie, "Machine Learning of Rules and Trees," in Machine learning, neural and statistical classification, Ellis Horwood, 1994, pp. 50-83.
-
(1994)
Machine Learning, Neural and Statistical Classification
, pp. 50-83
-
-
Feng, C.1
Michie, D.2
-
28
-
-
84926662675
-
Nearest Neighbor Pattern Classification
-
Jan.
-
T. Cover and P. Hart, "Nearest Neighbor Pattern Classification, "IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 21-27, Jan. 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, Issue.1
, pp. 21-27
-
-
Cover, T.1
Hart, P.2
-
29
-
-
0035478854
-
Random Forests
-
Oct.
-
L. Breiman, "Random Forests," Machine Learning, vol. 45, no. 1, pp. 5-32, Oct. 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
30
-
-
0002900357
-
The Case Against Accuracy Estimation for Comparing Induction Algorithms
-
F. Provost, T. Fawcett, and R. Kohavi, "The Case Against Accuracy Estimation for Comparing Induction Algorithms," in Proceedings of the Fifteenth International Conference on Machine Learning (ICML 98), 1998, pp. 445-53.
-
Proceedings of the Fifteenth International Conference on Machine Learning (ICML 98), 1998
, pp. 445-453
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
|