-
3
-
-
84875667018
-
A fast randomness test that preserves local detail
-
Virus Bulletin, Abingdon
-
Ebringer, R., Sun, L., Boztas, S.: A fast randomness test that preserves local detail. In: Proceedings of the Virus Bulletin (VB) Conference, pp. 34-42. Virus Bulletin, Abingdon (2008).
-
(2008)
Proceedings of the Virus Bulletin (VB) Conference
, pp. 34-42
-
-
Ebringer, R.1
Sun, L.2
Boztas, S.3
-
4
-
-
47749141577
-
Network traffic classification by common subsequence finding
-
M. Bubak, G. Albadavan, and P. Sloot (Eds.), Berlin: Springer
-
Fabjanski K., Kruk T.: Network traffic classification by common subsequence finding. In: Bubak, M., Albada, G., Sloot, P. (eds) Computational Science-ICCS 2008, vol. 5101, pp. 499-508. Springer, Berlin (2008).
-
(2008)
Computational Science-ICCS 2008
, vol.5101
, pp. 499-508
-
-
Fabjanski, K.1
Kruk, T.2
-
5
-
-
54849414050
-
An automated virus classification system
-
Virus Bulletin, Abingdon
-
Gheorghescu, M.: An automated virus classification system. In: Proceedings of the Virus Bulletin (VB) Conference, pp. 294-300. Virus Bulletin, Abingdon (2005).
-
(2005)
Proceedings of the Virus Bulletin (VB) Conference
, pp. 294-300
-
-
Gheorghescu, M.1
-
7
-
-
72149113070
-
Malware obfuscation measuring via evolutionary similarity
-
IEEE Computer Society, Los Alamitos
-
Li, J., Xu, J., Xu, M., Zhao, H., Zheng, N.: Malware obfuscation measuring via evolutionary similarity. In: Proceedings of the International Conference on Future Information Networks, pp. 197-200. IEEE Computer Society, Los Alamitos (2009).
-
(2009)
Proceedings of the International Conference on Future Information Networks
, pp. 197-200
-
-
Li, J.1
Xu, J.2
Xu, M.3
Zhao, H.4
Zheng, N.5
-
8
-
-
34047129159
-
Using entropy analysis to find encrypted and packed malware
-
Lyda R., Hamrock J.: Using entropy analysis to find encrypted and packed malware. IEEE Security Priv. 5(2), 40-45 (2007).
-
(2007)
IEEE Security Priv.
, vol.5
, Issue.2
, pp. 40-45
-
-
Lyda, R.1
Hamrock, J.2
-
9
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
IEEE Computer Society, Los Alamitos
-
Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 226-241. IEEE Computer Society, Los Alamitos (2005).
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
10
-
-
50149118846
-
Classification of packed executables for accurate computer virus detection
-
Perdisci R., Lanzi A., Lee W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14), 1941-1946 (2008).
-
(2008)
Pattern Recognit. Lett.
, vol.29
, Issue.14
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
11
-
-
78649818552
-
Pattern recognition techniques for the classification of malware packers
-
Springer, Berlin
-
Sun, L., Versteeg, S., Boztas, S., Yann, T.: Pattern recognition techniques for the classification of malware packers. In: Proceedings of the 15th Australian Conference on Information Security and Privacy (pp. 370-390). Springer, Berlin (2010).
-
(2010)
Proceedings of the 15th Australian Conference on Information Security and Privacy
, pp. 370-390
-
-
Sun, L.1
Versteeg, S.2
Boztas, S.3
Yann, T.4
-
12
-
-
21644475665
-
Static analyzer of vicious executables (SAVE)
-
IEEE Computer Society, Washington
-
Sung, A. H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (SAVE). In: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 326-334. IEEE Computer Society, Washington (2004).
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
13
-
-
54849441430
-
Malware behaviour analysis, extended version
-
Wagener G., State R., Dulaunoy A.: Malware behaviour analysis, extended version. J. Comput. Virol. 4(4), 279-287 (2007).
-
(2007)
J. Comput. Virol.
, vol.4
, Issue.4
, pp. 279-287
-
-
Wagener, G.1
State, R.2
Dulaunoy, A.3
-
15
-
-
80255128580
-
-
Department of Computer Science University of California Santa Barbara Technical Report, 2010-26. Retrieved 29 November 2010 from
-
Jacob, G., Neugschwandtner, M., Comparetti, P. M., Kruegel, C., Vigna, G.: A static, packer-agnostic filter to detect similar malware samples. Department of Computer Science University of California Santa Barbara Technical Report, 2010-26. Retrieved 29 November 2010 from http://www. cs. ucsb. edu/research/tech_reports/ (2010).
-
(2010)
A static, packer-agnostic filter to detect similar malware samples
-
-
Jacob, G.1
Neugschwandtner, M.2
Comparetti, P.M.3
Kruegel, C.4
Vigna, G.5
-
16
-
-
0015960104
-
The string-to-string correction problem
-
Wagner R. A., Fischer M. J.: The string-to-string correction problem. J. ACM 21(1), 168-173 (1974).
-
(1974)
J. ACM
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.A.1
Fischer, M.J.2
-
17
-
-
84896460091
-
Èntropijnye i drugie sistemnye zakonomernosti. Voprosy upravlenija složnymi sistemami
-
Nauka, Moscow
-
Prangišvili, I. V.: Èntropijnye i drugie sistemnye zakonomernosti. Voprosy upravlenija složnymi sistemami (Entropy and other system laws. Issues of managing complex systems). p. 432. Nauka, Moscow (2003).
-
(2003)
Entropy and other system laws. Issues of managing complex systems
, pp. 432
-
-
Prangišvili, I.V.1
|