-
1
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 38-49 (2001) (Pubitemid 32882625)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
2
-
-
78649820620
-
Automatic behaviour-based analysis and classification system for malware detection
-
Devesa, J., Santos, I., Cantero, X., Penya, Y.K., Bringas, P.G.: Automatic Behaviour-based Analysis and Classification System for Malware Detection. In: Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS), pp. 395-399 (2010)
-
(2010)
Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS
, pp. 395-399
-
-
Devesa, J.1
Santos, I.2
Cantero, X.3
Penya, Y.K.4
Bringas, P.G.5
-
3
-
-
80052977357
-
Semi-supervised learning for unknown malware detection
-
Santos, I., Nieves, J., Bringas, P.G.: Semi-supervised learning for unknown malware detection. In: Proceedings of the 4th International Symposium on Distributed Computing and Artificial Intelligence (DCAI), 9th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS), pp. 415-422 (2011)
-
(2011)
Proceedings of the 4th International Symposium on Distributed Computing and Artificial Intelligence (DCAI) 9th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS)
, pp. 415-422
-
-
Santos, I.1
Nieves, J.2
Bringas, P.G.3
-
4
-
-
80052494221
-
Collective classification for unknown malware detection
-
Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT), pp. 251-256 (2011)
-
(2011)
Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT
, pp. 251-256
-
-
Santos, I.1
Laorden, C.2
Bringas, P.G.3
-
5
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
(in press), doi:10.1016/j.ins.2011.08.020
-
Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences (in press), doi:10.1016/j.ins.2011.08.020
-
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
6
-
-
49949090311
-
Learning and classification of malware behavior
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and Classification of Malware Behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
7
-
-
77950115244
-
An automated classification system based on the strings of trojan and virus families
-
IEEE
-
Tian, R., Batten, L., Islam, R., Versteeg, S.: An automated classification system based on the strings of trojan and virus families. In: 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 23-30. IEEE (2009)
-
(2009)
4th International Conference on Malicious and Unwanted Software (MALWARE
, pp. 23-30
-
-
Tian, R.1
Batten, L.2
Islam, R.3
Versteeg, S.4
-
8
-
-
79951646815
-
Automated static code analysis for classifying android applications using machine learning
-
December
-
Shabtai, A., Fledel, Y., Elovici, Y.: Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. In: 2010 International Conference on Computational Intelligence and Security, pp. 329-333 (December 2010)
-
(2010)
2010 International Conference on Computational Intelligence and Security
, pp. 329-333
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
9
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
ACM
-
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACMWorkshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15-26. ACM (2011)
-
(2011)
Proceedings of the 1st ACMWorkshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
10
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
IEEE
-
Blasing, T., Batyuk, L., Schmidt, A., Camtepe, S., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55-62. IEEE (2010)
-
(2010)
2010 5th International Conference on Malicious and Unwanted Software (MALWARE
, pp. 55-62
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.3
Camtepe, S.4
Albayrak, S.5
-
11
-
-
84867714245
-
Applying behavioral detection on android-based devices
-
Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) Mobilware 2010. Springer, Heidelberg
-
Shabtai, A., Elovici, Y.: Applying Behavioral Detection on Android-Based Devices. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) Mobilware 2010. LNICST, vol. 48, pp. 235-249. Springer, Heidelberg (2010)
-
(2010)
LNICST
, vol.48
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
14
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: International Joint Conference on Artificial Intelligence, vol. 14, pp. 1137-1145 (1995)
-
(1995)
International Joint Conference on Artificial Intelligence
, vol.14
, pp. 1137-1145
-
-
Kohavi, R.1
-
15
-
-
67650330214
-
Comparative analysis of regression and machine learning methods for predicting fault proneness models
-
Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology 35(2), 183-193 (2009)
-
(2009)
International Journal of Computer Applications in Technology
, vol.35
, Issue.2
, pp. 183-193
-
-
Singh, Y.1
Kaur, A.2
Malhotra, R.3
|