-
1
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M. G., Eskin, E., Zadok, E., and Stolfo, S. J., "Data Mining Methods for Detection of New Malicious Executables," Proc. of the 2001 IEEE Symposium on Security and Privacy, Los Alamitos, pp. 38-49, 2001. (Pubitemid 32882625)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
2
-
-
18144374544
-
Classification methods in the detection of new malicious emails
-
DOI 10.1016/j.ins.2004.06.003, PII S002002550400180X
-
Shih, D. H., Chiang, H. S., and Yen, C. D., "Classification Methods in the Detection of New Malicious Emails," Information Sciences, Vol. 172, Issue 1-2, pp. 241-261, 2005. (Pubitemid 40612875)
-
(2005)
Information Sciences
, vol.172
, Issue.1-2
, pp. 241-261
-
-
Shih, D.-H.1
Chiang, H.-S.2
Yen, C.D.3
-
3
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter, J. Z. and Maloof, M. A., "Learning to Detect and Classify Malicious Executables in the Wild," Journal of Machine Learning Research, Vol. 7, pp. 2721-2744, 2006. (Pubitemid 46011490)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
4
-
-
63149120017
-
Using support vector machine to detect unknown computer viruses
-
Zhang, B. Y., Yin, J. P., Hao, J. B., Zhnag, D. X., and Wang, S. Lin, "Using Support Vector Machine to Detect Unknown Computer Viruses," International Journal of Computational Intelligence Research, Vol. 2, No. 1, pp. 100-104, 2006.
-
(2006)
International Journal of Computational Intelligence Research
, vol.2
, Issue.1
, pp. 100-104
-
-
Zhang, B.Y.1
Yin, J.P.2
Hao, J.B.3
Zhnag, D.X.4
Wang S. Lin5
-
5
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
Moskovitch, R., Elovici, Y., and Rokach, L., "Detection of Unknown Computer Worms Based on Behavioral Classification of the Host," Computational Statistics and Data Analysis, Vol. 52, Issue 9, pp. 4544-4566, 2008.
-
(2008)
Computational Statistics and Data Analysis
, vol.52
, Issue.9
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
6
-
-
58049195305
-
Unknown malicious executables detection based on run-time behavior
-
Shandong, China
-
Hu, Y. T., Chen, L. A., Xu, M., Zheng, N., and Guo, Y. H., "Unknown Malicious Executables Detection Based on Run-time Behavior," Proc. of the 5th International Conference on Fuzzy Systems and Knowledge Discovery, Shandong, China, pp. 391-395, 2008.
-
(2008)
Proc. of the 5th International Conference on Fuzzy Systems and Knowledge Discovery
, pp. 391-395
-
-
Hu, Y.T.1
Chen, L.A.2
Xu, M.3
Zheng, N.4
Guo, Y.H.5
-
7
-
-
58849157332
-
Unknown malcode detection using OPCODE representation
-
Esbjerg, Denmark
-
Dolev, S. and Elovici, Y., "Unknown Malcode Detection Using OPCODE Representation," Proc. of the 1st European Conference on Intelligence and Security Informatics, Esbjerg, Denmark, pp. 204-215, 2008.
-
(2008)
Proc. of the 1st European Conference on Intelligence and Security Informatics
, pp. 204-215
-
-
Dolev, S.1
Elovici, Y.2
-
8
-
-
18844362133
-
N-gram-based detection of new malicious code
-
Proceedings of the 28th Annual International Computer Software and Applications Conference; Workshop Papers and Fast Abstracts, COMPSAC 2004
-
Assaleh, T. A., Cercone, N., Keselj, V., and Sweidan, R., "N-gram-based Detection of New Malicious Code," Proc. of the 28th Annual International Computer Software and Application Conference, HongKong, pp. 41-42, 2004. (Pubitemid 40680776)
-
(2004)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 41-42
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
9
-
-
26944454412
-
Using fuzzy pattern recognition to detect unknown malicious executables code
-
Changsha, China
-
Zhang, B. Y., Yin, J. P., and Hao, J. B., "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code," Proc. of the Second International Conference on Fuzzy Systems and Knowledge Discovery, Changsha, China, pp. 629-634, 2005.
-
(2005)
Proc. of the Second International Conference on Fuzzy Systems and Knowledge Discovery
, pp. 629-634
-
-
Zhang, B.Y.1
Yin, J.P.2
Hao, J.B.3
-
10
-
-
34748865971
-
A feature selection and evaluation schedule for computer virus detection
-
HongKong
-
Henchiri, O. and Japkowicz, N., "A Feature Selection and Evaluation Schedule for Computer Virus Detection," Proc. of the 6th International Conference on Data Mining, HongKong, pp. 1-6, 2006.
-
(2006)
Proc. of the 6th International Conference on Data Mining
, pp. 1-6
-
-
Henchiri, O.1
Japkowicz, N.2
-
11
-
-
54849412646
-
An intelligent PE-malware detection system based on association mining
-
Ye, Y. F., Wang, D. D., Li, T., and Ye, D. Y., "An Intelligent PE-malware Detection System Based on Association Mining," Journal in Computer Virology, Vol. 4, No.4, pp. 323-334, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.F.1
Wang, D.D.2
Li, T.3
Ye, D.Y.4
-
12
-
-
57749168876
-
A feature selection for malicious detection
-
Phuket, Thailand
-
Lai, Y. X., "A Feature Selection for Malicious Detection," Proc. of the 9th International Association for Computer and Information Science Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing, Phuket, Thailand, pp. 365-370, 2008.
-
(2008)
Proc. of the 9th International Association for Computer and Information Science Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing
, pp. 365-370
-
-
Lai, Y.X.1
-
13
-
-
38549122470
-
A hybrid model to detect malicious executables
-
DOI 10.1109/ICC.2007.242, 4288913, 2007 IEEE International Conference on Communications, ICC'07
-
Masud, M. M., Khan, L., and Thuraisingham, B., "A Hybrid Model to Detect Malicious Executables," Proc. of the IEEE International Conference on Communications, Glasgow, UK, pp. 1443-1448, 2007. (Pubitemid 351145738)
-
(2007)
IEEE International Conference on Communications
, pp. 1443-1448
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
14
-
-
39749143915
-
A scalable multi-level feature extraction technique to detect malicious executables
-
DOI 10.1007/s10796-007-9054-3
-
Masud, M. M., Khan, L., and Thuraisingham, B., "A Scalable Multi-level Feature Extraction Technique to Detect Malicious Executables," Information Systems Frontiers, Vol. 10, No. 1, pp. 33-45, 2008. (Pubitemid 351303936)
-
(2008)
Information Systems Frontiers
, vol.10
, Issue.1
, pp. 33-45
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
15
-
-
57749204679
-
New malicious code detection using variable length n-grams
-
Reddy, K.S., Dash, S.K., and Pujari, A.K., "New Malicious Code Detection Using Variable Length n-grams," Lecture Notes in Computer Science, Vol. 4332, pp. 276-288, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4332
, pp. 276-288
-
-
Reddy, K.S.1
Dash, S.K.2
Pujari, A.K.3
-
16
-
-
70350621370
-
SBMDS: An interpretable string based malware detection system using SVM ensemble with bagging
-
Ye, Y.Y., Chen, L.F., Wang, D.D., Li, T., Jiang, Q.S., and Zhao, M., "SBMDS: An interpretable string based malware detection system using SVM ensemble with bagging," Journal in Computer Virology, Vol. 5, No.4, pp. 283-293, 2009.
-
(2009)
Journal in Computer Virology
, vol.5
, Issue.4
, pp. 283-293
-
-
Ye, Y.Y.1
Chen, L.F.2
Wang, D.D.3
Li, T.4
Jiang, Q.S.5
Zhao, M.6
-
17
-
-
76649143365
-
PE-Miner: Mining structural information to detect malicious executables in realtime
-
Shafiq, M.Z., Tabish, S.M., Mirza, F., and Farooq, M., "PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime," Lecture Notes in Computer Science, Vol. 5758, pp. 121-141, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5758
, pp. 121-141
-
-
Shafiq, M.Z.1
Tabish, S.M.2
Mirza, F.3
Farooq, M.4
-
18
-
-
58049154123
-
An approach of malicious executables detection on black & gray based on adaboost algorithm
-
Guyang, China
-
Liu L. and Shao, K., "An Approach of Malicious Executables Detection on Black & Gray Based on AdaBoost Algorithm," Proc. of the 2nd International Conference on Anti-counterfeiting, Security, and Identification, Guyang, China, pp. 88-92, 2008.
-
(2008)
Proc. of the 2nd International Conference on Anti-counterfeiting, Security, and Identification
, pp. 88-92
-
-
Liu, L.1
Shao, K.2
-
19
-
-
57649195950
-
A novel approach to malicious executables detection and containment based on distributed system architecture
-
Jinan, China
-
Liu, Z. and Zhang, X. S., "A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture," Proc. of the 4th International Conference on Natural Computation, Jinan, China, pp. 160-164, 2008.
-
(2008)
Proc. of the 4th International Conference on Natural Computation
, pp. 160-164
-
-
Liu, Z.1
Zhang, X.S.2
-
20
-
-
40649091872
-
Unknown malicious codes detection based on rough set theory and support vector machine
-
Vancouver, Canada
-
Zhang, B. Y., Yin, J. P., Tang, W. S., Hao, J. B., and Zhang, D. X., "Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine," Proc. of 2006 International Joint Conference on Neural Networks, Vancouver, Canada, pp. 2583-2587, 2006.
-
(2006)
Proc. of 2006 International Joint Conference on Neural Networks
, pp. 2583-2587
-
-
Zhang, B.Y.1
Yin, J.P.2
Tang, W.S.3
Hao, J.B.4
Zhang, D.X.5
-
21
-
-
34547249933
-
A surveillance spyware detection system based on data mining methods
-
Vancouver, Canada
-
Wang, T. Y., Horng, S. J., Su, M. Y., Wu, C. H., Wang, P. C., and Su, W. Z., "A Surveillance Spyware Detection System Based on Data Mining Methods," Proc. of 2006 International Joint Conference on Neural Networks, Vancouver, Canada, pp. 3236-3241, 2006.
-
(2006)
Proc. of 2006 International Joint Conference on Neural Networks
, pp. 3236-3241
-
-
Wang, T.Y.1
Horng, S.J.2
Su, M.Y.3
Wu, C.H.4
Wang, P.C.5
Su, W.Z.6
-
22
-
-
67650251631
-
Malicious code detection using active learning
-
Moskovitch, R., Nissim, N., and Elovici, Y., "Malicious Code Detection Using Active Learning," Lecture Notes in Computer Science, Vol. 5456, pp. 74-91, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5456
, pp. 74-91
-
-
Moskovitch, R.1
Nissim, N.2
Elovici, Y.3
-
23
-
-
26944502079
-
Unknown computer virus detection based on K-nearest neighbor algorithm
-
Zhang, B. Y., Yin, J., Zhang, D., Hao, J., "Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm," Computer Engineering and Applications, Vol. 6, pp. 7-10, 2005.
-
(2005)
Computer Engineering and Applications
, vol.6
, pp. 7-10
-
-
Zhang, B.Y.1
Yin, J.2
Zhang, D.3
Hao, J.4
-
24
-
-
70350179568
-
Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques
-
Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., and Elovici, Y., "Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques," Transactions on Engineering, Computing and Technology, Vol. 15, pp. 202-208, 2006.
-
(2006)
Transactions on Engineering, Computing and Technology
, vol.15
, pp. 202-208
-
-
Stopel, D.1
Boger, Z.2
Moskovitch, R.3
Shahar, Y.4
Elovici, Y.5
-
25
-
-
40649103203
-
Application of artificial neural networks techniques to computer worm detection
-
Vancouver, Canada
-
Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., and Elovici, Y., "Application of Artificial Neural Networks Techniques to Computer Worm Detection," Proc. of 2006 International Joint Conference on Neural Networks, Vancouver, Canada, pp. 2362-2369, 2006.
-
Proc. of 2006 International Joint Conference on Neural Networks
, vol.2006
, pp. 2362-2369
-
-
Stopel, D.1
Boger, Z.2
Moskovitch, R.3
Shahar, Y.4
Elovici, Y.5
-
26
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
Menahem, E., Shabtai, A., Rokach, L., and Elovici, Y., "Improving Malware Detection by Applying Multi-inducer Ensemble," Computational Statistics and Data Analysis, Vol. 53, Issue 4, pp. 1483-1494, 2009.
-
(2009)
Computational Statistics and Data Analysis
, vol.53
, Issue.4
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
27
-
-
0000551189
-
Popular ensemble methods: An empirical study
-
Opitz, D. and Maclin, R., "Popular Ensemble Methods: A Empirical Study," Journal of Artificial Intelligence Research, Vol. 11, pp. 169-198, 1999. (Pubitemid 129628763)
-
(1999)
Journal of Artificial Intelligence Research
, vol.11
, pp. 169-198
-
-
Opitz, D.1
Maclin, R.2
-
29
-
-
84958554285
-
An evaluation of grading classifiers
-
Advances in Intelligent Data Analysis
-
Seewald, A. K. and Furnkranz, J., "An Evaluation of Grading Classifiers," Proc. of 4th International Symposium on Intelligent Data Analysis, Lisbon, Portugal, pp. 115-124, 2001. (Pubitemid 33348491)
-
(2001)
Lecture Notes in Computer Science
, Issue.2189
, pp. 115-124
-
-
Seewald, A.K.1
Furnkranz, J.2
-
30
-
-
8444242169
-
A hybrid decision support tool-using ensemble of classifiers
-
Porto, Portugal
-
Kotsiantis, S. B. and Pintelas, P. E., "A Hybrid Decision Support Tool-Using Ensemble of Classifiers," Proc. of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, Vol. 2, pp. 448-453, 2006.
-
(2006)
Proc. of the 6th International Conference on Enterprise Information Systems
, vol.2
, pp. 448-453
-
-
Kotsiantis, S.B.1
Pintelas, P.E.2
-
31
-
-
33750327345
-
A framework for the application of association rule mining in large intrusion detection infrastructures
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
Treinen, J. J. and Thurimella, R., "A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures," Proc. of 9th International Symposium on Recent Advances in Intrusion and detection, Hamburg, Germany, pp. 1-18, 2006. (Pubitemid 44617844)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219 LNCS
, pp. 1-18
-
-
Treinen, J.J.1
Thurimella, R.2
-
32
-
-
70349503911
-
Metamorphic virus: Analysis and detection
-
Royal Holloway University of London
-
Konstantinou, E. and Wolthusen S., "Metamorphic Virus: Analysis and Detection," Technical Report RHUL-MA-2008-02, Royal Holloway University of London, 2008.
-
(2008)
Technical Report RHUL-MA-2008-02
-
-
Konstantinou, E.1
Wolthusen, S.2
-
33
-
-
84855320425
-
-
DARPA Datasets
-
DARPA Datasets, http://www.ll.mit.edu/ mission/Communications/ist/ corporal/ideval/data/ index.html
-
-
-
-
34
-
-
84855320424
-
-
PEView
-
PEView, http://hs.hosp.ncku.edu.tw/cww/html/download.html
-
-
-
-
35
-
-
84855334539
-
-
VMWare
-
VMWare, http://www.vmware.com
-
-
-
-
36
-
-
84855320423
-
-
PEiD
-
PEiD, http://www.softpedia.com/ progDownload/PEiD-updated-Download-4102. html
-
-
-
-
37
-
-
84855298820
-
-
AutoRuns
-
AutoRuns, http://technet.microsoft.com /en-us/sysinternals/bb963902.aspx
-
-
-
-
38
-
-
84855314042
-
-
ProcessExplorer
-
ProcessExplorer, http://tec om/en-us/ sysinternals/bb896653.asp
-
-
-
-
39
-
-
84855320427
-
-
FileMon
-
FileMon,http://technet.micros/sysinternals/bb896642.aspx
-
-
-
-
40
-
-
84855320429
-
-
Rootkitrevealer
-
Rootkitrevealer, http://technet. om/en-us/sysinter
-
-
-
-
41
-
-
84855320428
-
-
IceSword
-
IceSword,http://antirootkit.com/software/IceSword.htm
-
-
-
-
42
-
-
84855298822
-
-
Fport
-
Fport, http://www.foundstone.com/us/ resources/ prod
-
-
-
-
43
-
-
27144489164
-
-
Burges, C., " A Tutorial on Support Vector Machine for Pattern Recogniti Mining and Knowledge Discovery, Vol. 2, No. 2, pp. 121-167, 1998.
-
(1998)
A Tutorial on Support Vector Machine for Pattern Recogniti Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.1
-
44
-
-
83755222666
-
-
Second Edition, Morgan Kaufmann Press, Chap. 10
-
Witten, I. H. and Eibe, F., Data Mining: Practical Machine Learning Tools and Techniques, Second Edition, Morgan Kaufmann Press, Chap. 10, p. 413, 2005.
-
(2005)
Practical Machine Learning Tools and Techniques
, pp. 413
-
-
Witten, I.H.1
Eibe, F.2
Data Mining3
-
45
-
-
83755191590
-
-
Second Edition, Morgan Kaufmann Press, Chap. 3
-
Witten, I. H. and Eibe, F., Data Mining: Practical Machine Learning Tools and Techniques, Second Edition, Morgan Kaufmann Press, Chap. 3, pp. 62-65, 2005.
-
(2005)
Practical Machine Learning Tools and Techniques
, pp. 62-65
-
-
Witten, I.H.1
Eibe, F.2
Data Mining3
-
46
-
-
83755203597
-
-
Second Edition, Morgan Kaufmann Press, Chap. 4
-
Witten, I. H. and Eibe, F., Data Mining: Practical Machine Learning Tools and Techniques, Second Edition, Morgan Kaufmann Press, Chap. 4, pp. 84-85, 2005.
-
(2005)
Data Mining: Practical Machine Learning Tools and Techniques
, pp. 84-85
-
-
Witten, I.H.1
Eibe, F.2
-
47
-
-
0001882616
-
Fast algorithms for mining association a for support vector machines rules
-
Santiago, Chile
-
Agrawal, R. and Srikant, R., " Fast Algorithms for Mining Association a for Support Vector Machines, " Rules, " Proc. of the 20th Very Large Databases Conference, Santiago, Chile, pp. 487-499, 1994.
-
(1994)
Proc. of the 20th Very Large Databases Conference
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
48
-
-
84855334540
-
-
WEKA
-
WEKA,http://www.cs.waikato.ac.nz/ml/weka/.
-
-
-
-
49
-
-
84855314045
-
-
LIBSVM: Library Software, available at
-
Chang, C. C. and Lin, C. J., " LIBSVM: Library Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/ index.html
-
-
-
Chang, C.C.1
Lin, C.J.2
|