-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
Abadi M., Budiu M., Erlingsson U., Ligatti J. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC) 2009, 13(1):4.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.1
, pp. 4
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
84860834767
-
-
Induction of one-level decision trees, in: Proceedings of the Ninth International Conference on Machine Learning, Citeseer
-
W. Ai, P. Langley, Induction of one-level decision trees, in: Proceedings of the Ninth International Conference on Machine Learning, Citeseer, 1992.
-
(1992)
-
-
Ai, W.1
Langley, P.2
-
3
-
-
84860839311
-
-
Automated Analysis of Computer Viruses
-
W. Arnold, G. Sorkin, Automated Analysis of Computer Viruses, 1996.
-
(1996)
-
-
Arnold, W.1
Sorkin, G.2
-
4
-
-
84860833874
-
-
Static analysis of binary code to isolate malicious behaviors, in: IEEE Eighth International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. (WET ICE'99) Proceedings, IEEE
-
J. Bergeron, M. Debbabi, M. Erhioui, B. Ktari, Static analysis of binary code to isolate malicious behaviors, in: IEEE Eighth International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. (WET ICE'99) Proceedings, IEEE, 1999, pp. 184-189.
-
(1999)
, pp. 184-189
-
-
Bergeron, J.1
Debbabi, M.2
Erhioui, M.3
Ktari, B.4
-
7
-
-
0035478854
-
Random forests
-
Breiman L. Random forests. Machine Learning 2001, 45(1):5-32.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
9
-
-
77954329802
-
-
A fast flowgraph based classification system for packed and polymorphic malware on the endhost, in: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE
-
S. Cesare, Y. Xiang, A fast flowgraph based classification system for packed and polymorphic malware on the endhost, in: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, 2010, pp. 721-728.
-
(2010)
, pp. 721-728
-
-
Cesare, S.1
Xiang, Y.2
-
10
-
-
70449427488
-
-
Dynamic detection of unknown malicious executables base on api interception, in: First International Workshop on Database Technology and Applications, IEEE
-
F. Chen, Y. Fu, Dynamic detection of unknown malicious executables base on api interception, in: First International Workshop on Database Technology and Applications, IEEE, 2009, pp. 329-332.
-
(2009)
, pp. 329-332
-
-
Chen, F.1
Fu, Y.2
-
11
-
-
85129530187
-
K: an instance-based learner using an entropic distance measure
-
in: International Workshop then Conference on Machine Learning, Morgan Kaufmann Publishers, Inc.
-
J. Cleary, L. Trigg, K*: an instance-based learner using an entropic distance measure, in: International Workshop then Conference on Machine Learning, Morgan Kaufmann Publishers, Inc., 1995, pp. 108-114.
-
(1995)
, pp. 108-114
-
-
Cleary, J.1
Trigg, L.2
-
12
-
-
77952602657
-
Efficient virus detection using dynamic instruction sequences
-
Dai J., Guha R., Lee J. Efficient virus detection using dynamic instruction sequences. Journal of Computers 2009, 4(5):405-414.
-
(2009)
Journal of Computers
, vol.4
, Issue.5
, pp. 405-414
-
-
Dai, J.1
Guha, R.2
Lee, J.3
-
13
-
-
0034250160
-
An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization
-
Dietterich T. An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Machine Learning 2000, 40(2):139-157.
-
(2000)
Machine Learning
, vol.40
, Issue.2
, pp. 139-157
-
-
Dietterich, T.1
-
14
-
-
0041833610
-
Partial auc estimation and regression
-
Dodd L., Pepe M. Partial auc estimation and regression. Biometrics 2003, 59(3):614-623.
-
(2003)
Biometrics
, vol.59
, Issue.3
, pp. 614-623
-
-
Dodd, L.1
Pepe, M.2
-
17
-
-
66049094737
-
Making Sense of Anti-malware Comparative Testing
-
Harley D. Making Sense of Anti-malware Comparative Testing. Information Security Technical Report 2009, 14(1):7-15.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 7-15
-
-
Harley, D.1
-
19
-
-
49749108277
-
-
Code graph for malware detection, in: International Conference on Information Networking. ICOIN 2008, IEEE
-
K. Jeong, H. Lee, Code graph for malware detection, in: International Conference on Information Networking. ICOIN 2008, IEEE, 2008, pp. 1-5.
-
(2008)
, pp. 1-5
-
-
Jeong, K.1
Lee, H.2
-
20
-
-
0003552088
-
-
Automatic extraction of computer virus signatures, in: Fourth Virus Bulletin International Conference
-
J. Kephart, W. Arnold, Automatic extraction of computer virus signatures, in: Fourth Virus Bulletin International Conference, 1994, pp. 178-184.
-
(1994)
, pp. 178-184
-
-
Kephart, J.1
Arnold, W.2
-
21
-
-
17644421307
-
Recent worms: a survey and trends
-
in: Proceedings of the 2003 ACM workshop on Rapid Malcode, ACM
-
D. Kienzle, M. Elder, Recent worms: a survey and trends, in: Proceedings of the 2003 ACM workshop on Rapid Malcode, ACM, 2003, pp. 1-10.
-
(2003)
, pp. 1-10
-
-
Kienzle, D.1
Elder, M.2
-
22
-
-
0001409330
-
Naive (Bayes) at forty: the independence assumption in information retrieval
-
Lewis D. Naive (Bayes) at forty: the independence assumption in information retrieval. Machine Learning: ECML 1998, 98:4-15.
-
(1998)
Machine Learning: ECML
, vol.98
, pp. 4-15
-
-
Lewis, D.1
-
23
-
-
48649087530
-
-
Limits of static analysis for malware detection, in: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, IEEE
-
A. Moser, C. Kruegel, E. Kirda, Limits of static analysis for malware detection, in: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, IEEE, 2007, pp. 421-430.
-
(2007)
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
24
-
-
0030685617
-
-
Proof-carrying code, in: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM
-
G. Necula, Proof-carrying code, in: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM, 1997, pp. 106-119.
-
(1997)
, pp. 106-119
-
-
Necula, G.1
-
25
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks 1999, 31(23-24):2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
27
-
-
84860841144
-
-
Fast Training of Support Vector Machines Using Sequential Minimal Optimization
-
J. Platt, Fast Training of Support Vector Machines Using Sequential Minimal Optimization, 1998.
-
(1998)
-
-
Platt, J.1
-
29
-
-
33751168025
-
N-Gram analysis for computer virus detection
-
Reddy D., Pujari A. n-Gram analysis for computer virus detection. Journal in Computer Virology 2006, 2(3):231-239.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.3
, pp. 231-239
-
-
Reddy, D.1
Pujari, A.2
-
30
-
-
70349869466
-
-
Signature generation and detection of malware families, in: Information Security and Privacy, Springer
-
V. Sathyanarayan, P. Kohli, B. Bruhadeshwar, Signature generation and detection of malware families, in: Information Security and Privacy, Springer, 2008, pp. 336-349.
-
(2008)
, pp. 336-349
-
-
Sathyanarayan, V.1
Kohli, P.2
Bruhadeshwar, B.3
-
31
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey
-
Shabtai A., Moskovitch R., Elovici Y., Glezer C. Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Information Security Technical Report 2009, 14(1):16-29.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
33
-
-
84860834766
-
-
Hunting for metamorphic, in: Virus Bulletin Conference
-
P. Ször, P. Ferrie, Hunting for metamorphic, in: Virus Bulletin Conference, 2001.
-
(2001)
-
-
Ször, P.1
Ferrie, P.2
-
34
-
-
0030216542
-
Neural networks for computer virus recognition
-
Tesauro G., Kephart J., Sorkin G. Neural networks for computer virus recognition. IEEE Expert 1996, 11(4):5-6.
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
-
35
-
-
84860839309
-
-
〈〉.
-
P.-E. Tool, 2011. 〈〉. http://www.pe-explorer.com/peexplorer-tour-disassembler.htm.
-
(2011)
-
-
Tool, P.-E.1
-
36
-
-
84860841141
-
-
A Comprehensive Survey on Malware and Malware Detection Techniques, CS 854-Hot Topics in Computer and Communications Security Project Report
-
T. Tran, K. Alsubhi, A Comprehensive Survey on Malware and Malware Detection Techniques, CS 854-Hot Topics in Computer and Communications Security Project Report, 2006.
-
(2006)
-
-
Tran, T.1
Alsubhi, K.2
-
37
-
-
70350666613
-
-
Static cfg analyzer for metamorphic malware code, in: Proceedings of the Second International Conference on Security of Information and Networks, ACM
-
P. Vinod, V. Laxmi, M. Gaur, G. Kumar, Y. Chundawat, Static cfg analyzer for metamorphic malware code, in: Proceedings of the Second International Conference on Security of Information and Networks, ACM, 2009, pp. 225-228.
-
(2009)
, pp. 225-228
-
-
Vinod, P.1
Laxmi, V.2
Gaur, M.3
Kumar, G.4
Chundawat, Y.5
-
38
-
-
28344446955
-
-
Polymorphic malicious executable scanner by api sequence analysis, in: Fourth International Conference on Hybrid Intelligent Systems. HIS'04, IEEE
-
J. Xu, A. Sung, P. Chavez, S. Mukkamala, Polymorphic malicious executable scanner by api sequence analysis, in: Fourth International Conference on Hybrid Intelligent Systems. HIS'04, IEEE, 2004, pp. 378-383.
-
(2004)
, pp. 378-383
-
-
Xu, J.1
Sung, A.2
Chavez, P.3
Mukkamala, S.4
-
39
-
-
54849412646
-
An intelligent pe-malware detection system based on association mining
-
Ye Y., Wang D., Li T., Ye D., Jiang Q. An intelligent pe-malware detection system based on association mining. Journal in Computer Virology 2008, 4(4):323-334.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
|