-
1
-
-
80755188379
-
-
Apache hadoop. http://hadoop.apache.org/.
-
-
-
-
2
-
-
80755174254
-
-
CMU Cloud Computer Cluster. http://www2.pdl.cmu.edu/~twiki/cgi-bin/view/ OpenCloud/ClusterOverview.
-
-
-
-
3
-
-
80755144110
-
-
Malware Analysis System. http://mwanalysis.org/.
-
-
-
-
4
-
-
80755144108
-
-
Offensive Computing. http://www.offensivecomputing.net/.
-
-
-
-
5
-
-
80755188377
-
-
SimMetrics. http://sourceforge.net/projects/simmetrics/.
-
SimMetrics
-
-
-
6
-
-
80755160293
-
-
VirusTotal. http://www.virustotal.com/.
-
-
-
-
7
-
-
80755160292
-
-
zynamics bindiff. http://www.zynamics.com/bindiff.html.
-
-
-
-
8
-
-
80755144109
-
-
April
-
Symantec internet security threat report. http://www.symantec.com/ business/theme.jsp?themeid=threatreport, April 2010.
-
(2010)
-
-
-
10
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM, 51(1):177-122, 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
, pp. 177-122
-
-
Andoni, A.1
Indyk, P.2
-
11
-
-
84904789621
-
Collaborative email-spam filtering with the hashing-trick
-
J. Attenberg, K. Weinberger, A. Dasgupta, A. Smola, and M. Zinkevich. Collaborative email-spam filtering with the hashing-trick. In Proceedings of the Sixth Conference on Email and Anti-Spam, 2009.
-
(2009)
Proceedings of the Sixth Conference on Email and Anti-spam
-
-
Attenberg, J.1
Weinberger, K.2
Dasgupta, A.3
Smola, A.4
Zinkevich, M.5
-
12
-
-
58149084148
-
Automated classification and analysis of internet malware
-
September
-
M. Bailey, J. Oberheide, J. Andersen, F. J. Z. Morley Mao, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the Symposium on Recent Advances in Intrusion Detection, September 2007.
-
(2007)
Proceedings of the Symposium on Recent Advances in Intrusion Detection
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Morley Mao, F.J.Z.4
Nazario, J.5
-
13
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proceedings of the Network and Distributed System Security Symposium, 2009.
-
(2009)
Proceedings of the Network and Distributed System Security Symposium
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
14
-
-
80755188378
-
-
D. Bernstein. http://www.cse.yorku.ca/~oz/hash.html.
-
-
-
Bernstein, D.1
-
15
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder and M. Mitzenmacher. Network applications of bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
18
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
23
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
DOI 10.1007/s11416-005-0002-9
-
M. Karim, A. Walenstein, A. Lakhotia, and L. Parida. Malware phylogeny generation using permutations of code. Journal in Computer Virology, 1(1):13-23, November 2005. (Pubitemid 44195063)
-
(2005)
Journal in Computer Virology
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, Md.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
25
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, Dec. 2006. (Pubitemid 46011490)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
27
-
-
48649084773
-
OmniUnpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu, and S. Jha. OmniUnpack: Fast, generic, and safe unpacking of malware. In In Proceedings of the Annual Computer Security Applications Conference, 2007.
-
(2007)
Proceedings of the Annual Computer Security Applications Conference
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
30
-
-
67149126890
-
Disco: Distributed co-clustering with map-reduce
-
S. Papadimitrou and J. Sun. Disco: Distributed co-clustering with map-reduce. In Proceedings of ICDM, 2008.
-
(2008)
Proceedings of ICDM
-
-
Papadimitrou, S.1
Sun, J.2
-
31
-
-
50149118846
-
Classification of packed executables for accurate computer virus detection
-
R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Pattern Recogn. Lett., 29(14):1941-1946, 2008.
-
(2008)
Pattern Recogn. Lett.
, vol.29
, Issue.14
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
32
-
-
85076751448
-
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces
-
R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In Proceedings of NSDI, 2010.
-
(2010)
Proceedings of NSDI
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
33
-
-
34748820878
-
PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
-
December
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the hidden-code extraction of unpack-executing malware. In Proceedings of Computer Security Applications Conference, December 2006.
-
(2006)
Proceedings of Computer Security Applications Conference
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
36
-
-
73549107233
-
Hash kernels for structured data
-
Q. Shi, J. Petterson, G. Dror, J. Langford, A. Smola, and S. Vishwanathan. Hash kernels for structured data. Journal of Machine Learning Research, 2009.
-
(2009)
Journal of Machine Learning Research
-
-
Shi, Q.1
Petterson, J.2
Dror, G.3
Langford, J.4
Smola, A.5
Vishwanathan, S.6
-
39
-
-
71149087699
-
Feature hashing for large-scale multitask learning
-
K. Weinberger, A. Dasgupta, J. Langford, A. Smola, and J. Attenberg. Feature hashing for large-scale multitask learning. In Proceedings of ICML, 2009.
-
(2009)
Proceedings of ICML
-
-
Weinberger, K.1
Dasgupta, A.2
Langford, J.3
Smola, A.4
Attenberg, J.5
|