-
1
-
-
18844362133
-
N-gram-based detection of new malicious code
-
Proceedings of the 28th Annual International Computer Software and Applications Conference; Workshop Papers and Fast Abstracts, COMPSAC 2004
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan N-gram-based detection of new malicious code Proceedings of the 28th annual international computer software and applications conference 2004 IEEE New York, USA 41 42 (Pubitemid 40680776)
-
(2004)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 41-42
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
8
-
-
70349240080
-
Ether: Malware analysis via Hardware Virtualization Extensions
-
ACM New York, NY, USA
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee Ether: malware analysis via Hardware Virtualization Extensions Proceedings of the 15th ACM Conference on computer and communications Security 2008 ACM New York, NY, USA 51 62
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
9
-
-
84893067845
-
An investigation of malware type classification
-
Academic Conferences Limited England
-
T. Dube, R. Raines, G. Peterson, K. Bauer, M. Grimaila, and S. Rogers An investigation of malware type classification Proceedings of 5th international conference on information-warfare and security 2010 Academic Conferences Limited England 398 406
-
(2010)
Proceedings of 5th International Conference on Information-warfare and Security
, pp. 398-406
-
-
Dube, T.1
Raines, R.2
Peterson, G.3
Bauer, K.4
Grimaila, M.5
Rogers, S.6
-
10
-
-
78649265912
-
Malware type recognition and cyber Situational awareness
-
IEEE
-
T. Dube, R. Raines, G. Peterson, K. Bauer, M. Grimaila, and S. Rogers Malware type recognition and cyber Situational awareness Proceedings of the IEEE second international conference on social computing 2010 IEEE 938 943
-
(2010)
Proceedings of the IEEE Second International Conference on Social Computing
, pp. 938-943
-
-
Dube, T.1
Raines, R.2
Peterson, G.3
Bauer, K.4
Grimaila, M.5
Rogers, S.6
-
11
-
-
77956394469
-
-
SIGKDD Explorations 11.1
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. Witten The WEKA data mining software: an update 2009 SIGKDD Explorations 11.1
-
(2009)
The WEKA Data Mining Software: An Update
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.6
-
16
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Kolter, and M. Maloof Learning to detect and Classify malicious executables in the Wild Journal of Machine Learning Research 7 2006 2721 2744 (Pubitemid 46011490)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
18
-
-
38949161848
-
AUC: A misleading measure of the performance of predictive distribution models
-
DOI 10.1111/j.1466-8238.2007.00358.x
-
J. Lobo, A. Jiménez-Valverde, and R. Real AUC: a misleading measure of the performance of predictive distribution models Global Ecology and Biogeography 17 2 2008 145 151 (Pubitemid 351228538)
-
(2008)
Global Ecology and Biogeography
, vol.17
, Issue.2
, pp. 145-151
-
-
Lobo, J.M.1
Jimenez-valverde, A.2
Real, R.3
-
20
-
-
84856008365
-
-
URL: (accessed 12.10.10)
-
manpagez man page hexdump section 1 2004 URL: (accessed 12.10.10)
-
(2004)
Man Page Hexdump Section 1
-
-
-
21
-
-
84875379930
-
-
URL
-
MathWorks, Inc. MATLAB 2010 URL:
-
(2010)
MATLAB
-
-
-
22
-
-
84856008366
-
-
URL: (accessed 05.12.10)
-
MathWorks, Inc. TreeBagger 2010 URL: (accessed 05.12.10)
-
(2010)
TreeBagger
-
-
-
25
-
-
84888464159
-
-
URL: (accessed 18.09.09)
-
Norman ASA Norman sandbox Sept. 2009 URL: (accessed 18.09.09)
-
(2009)
Norman Sandbox
-
-
Asa, N.1
-
28
-
-
84858091853
-
-
Software Engineering Institute Carnegie Mellon University URL: (accessed 26.07.11)
-
® Advisory CA-1992-02 Michelangelo PC virus Warning Sep. 1997 Carnegie Mellon University URL: (accessed 26.07.11)
-
(1997)
® Advisory CA-1992-02 Michelangelo PC Virus Warning
-
-
-
29
-
-
84856009369
-
-
Sunbelt Software URL: (accessed 18.09.09)
-
Sunbelt Software Sunbelt cwsandbox Sept. 2009 URL: (accessed 18.09.09)
-
(2009)
Sunbelt Cwsandbox
-
-
-
33
-
-
84855986152
-
-
ThreatExpert Ltd URL: (accessed 18.02.09)
-
ThreatExpert Ltd Automated threat analysis Feb. 2009 URL: (accessed 18.02.09)
-
(2009)
Automated Threat Analysis
-
-
|