-
4
-
-
33748978409
-
Malware pattern scanning schemes secure against blackbox analysis
-
Filiol, E., 2006. Malware pattern scanning schemes secure against blackbox analysis. J. Comput. Virol., 2(1): 35-50.
-
(2006)
J. Comput. Virol
, vol.2
, Issue.1
, pp. 35-50
-
-
Filiol, E.1
-
5
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioral detection strategies
-
Filiol, E., G. Jacob, M.L. Liard, 2007. Evaluation methodology and theoretical model for antiviral behavioral detection strategies. J. Comput. Virol., 3(1): 27-37
-
(2007)
J. Comput. Virol
, vol.3
, Issue.1
, pp. 27-37
-
-
Filiol, E.1
Jacob, G.2
Liard, M.L.3
-
6
-
-
0033281425
-
Large margin classification using the perceptron algorithm
-
Freund, Y. and R.E. Schapire, 1999. Large margin classification using the perceptron algorithm. In Machine Learning, 37(3): 277-296.
-
(1999)
In Machine Learning
, vol.37
, Issue.3
, pp. 277-296
-
-
Freund, Y.1
Schapire, R.E.2
-
7
-
-
54849439170
-
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
-
Hashemi, S., Y. Yang, D. Zabihzadeh and M. Kangavari, 2008. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems, 25(5).
-
(2008)
Expert Systems
, vol.25
, Issue.5
-
-
Hashemi, S.1
Yang, Y.2
Zabihzadeh, D.3
Kangavari, M.4
-
8
-
-
0033640646
-
Statistical pattern recognition: A review
-
Jain, A., R. Duin, J. Mao, 2000. Statistical pattern recognition: A review. IEEE Trans. Pattern Anal. Mach. Intell., 22:. 4-37.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.22
, pp. 4-37
-
-
Jain, A.1
Duin, R.2
Mao, J.3
-
10
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
In
-
Kolter, J. and M. Maloof, 2004. Learning to detect malicious executables in the wild. In Proceedings of KDD'04.
-
(2004)
Proceedings of KDD'04
-
-
Kolter, J.1
Maloof, M.2
-
12
-
-
0029488806
-
Mcf A malicious code filter
-
Lo, R., K. Levitt, R. Olsson, 1995. Mcf A malicious code filter. Comput. Secur, 14: 541-566
-
(1995)
Comput. Secur
, vol.14
, pp. 541-566
-
-
Lo, R.1
Levitt, K.2
Olsson, R.3
-
13
-
-
0034269416
-
Attacking malicious code: Report to the infosec research council
-
McGraw, G., G. Morrisett, 2002. Attacking malicious code: report to the infosec research council. IEEE Softw., 17(5): 33-41.
-
(2002)
IEEE Softw
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
14
-
-
18844437024
-
Detection of injected, dynamically generated and obfuscated malicious code
-
In
-
Rabek, J., R. Khazan, S. Lewandowski, R. Cunningham, 2003. Detection of injected, dynamically generated and obfuscated malicious code. In: Proceedings of the ACM Workshop on Rapid Malcode, pp: 76-82.
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
, pp. 76-82
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
17
-
-
33646414637
-
-
Addison Wesley for Symantec Press, New Jersey, Vx virus dataset, Available from: [Accessed 2 Jan 2011]
-
Szor, P., 2005. The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey, Vx virus dataset, Available from: http://vx.netlux.org [Accessed 2 Jan 2011].
-
(2005)
The Art of Computer Virus Research and Defense
-
-
Szor, P.1
-
18
-
-
2342663706
-
Virus detection using data mining techniques
-
In
-
Wang, J., P. Deng, Y. Fan, L. Jaw and Y. Liu, 2003. Virus detection using data mining techniques. In Proceedings of IEEE International Conference on Data Mining.
-
(2003)
Proceedings of IEEE International Conference on Data Mining
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
-
20
-
-
54849412646
-
An intelligent pe-malware detection system based on association mining
-
In,Zakorzhevsky 2011. Monthly Malware Statistics. Available from: [Accessed 2 July
-
Ye, Y., D. Wang, T. Li and D. Ye, 2008. An intelligent pe-malware detection system based on association mining. In Journal in Computer Virology, Zakorzhevsky, 2011. Monthly Malware Statistics. Available from: http://www.securelist.com/en/analysis/204792182/Monthly_Malware_Statistics_June_ [Accessed 2 July.
-
(2008)
Journal in Computer Virology
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
|