-
1
-
-
33746864380
-
Detection of new malicious code using n-grams signatures
-
Citeseer
-
Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: Detection of new malicious code using n-grams signatures. In: Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 193-196. Citeseer (2004).
-
(2004)
In: Proceedings of Second Annual Conference on Privacy, Security and Trust
, pp. 193-196
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
3
-
-
34250666936
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. 2001, 184-189 (2001).
-
(2001)
Int. J. Req. Eng.
, vol.2001
, pp. 184-189
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
4
-
-
26444505656
-
Detection of malicious code in cots software: A short survey
-
Bergeron, J., Debbabi, M., Desharnais, J., Ktari, B., Salois, M., Tawbi, N., Charpentier, R., Patry, M.: Detection of malicious code in cots software: A short survey. In: First International Software Assurance Certification Conference (ISACC99) (1999).
-
(1999)
In: First International Software Assurance Certification Conference (ISACC99)
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Ktari, B.4
Salois, M.5
Tawbi, N.6
Charpentier, R.7
Patry, M.8
-
5
-
-
0035478854
-
Random forests
-
Breiman, L.: Random forests. Mach. Learn. 45(1), 5-32 (2001).
-
(2001)
Mach. Learn.
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
7
-
-
0034250160
-
An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization
-
Dietterich, T.: An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Mach. Learn. 40(2), 139-157 (2000).
-
(2000)
Mach. Learn.
, vol.40
, Issue.2
, pp. 139-157
-
-
Dietterich, T.1
-
10
-
-
0031276011
-
Bayesian network classifiers
-
Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29(2), 131-163 (1997).
-
(1997)
Mach. Learn.
, vol.29
, Issue.2
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
11
-
-
0028737912
-
Weka: A machine learning workbench. In: Intelligent Information Systems, 1994
-
IEEE
-
Holmes, G., Donkin, A., Witten, I.: Weka: A machine learning workbench. In: Intelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on, pp. 357-361. IEEE (1994).
-
(1994)
Proceedings of the 1994 Second Australian and New Zealand Conference on
, pp. 357-361
-
-
Holmes, G.1
Donkin, A.2
Witten, I.3
-
14
-
-
0026992322
-
An analysis of bayesian classifiers
-
Wiley, Hoboken
-
Langley, P., Iba, W., Thompson, K.: An analysis of bayesian classifiers. In: Proceedings of the National Conference on Artificial Intelligence, pp. 223-223. Wiley, Hoboken (1992).
-
(1992)
In: Proceedings of the National Conference on Artificial Intelligence
, pp. 223
-
-
Langley, P.1
Iba, W.2
Thompson, K.3
-
15
-
-
84957069091
-
Naive (bayes) at forty: The independence assumption in information retrieval
-
Lewis, D.: Naive (bayes) at forty: The independence assumption in information retrieval. Machine Learning: ECML-98, pp. 4-15 (1998).
-
(1998)
Machine Learning: ECML-98
, pp. 4-15
-
-
Lewis, D.1
-
18
-
-
84950445313
-
Cross-validation of regression models
-
Picard, R., Cook, R.: Cross-validation of regression models. J. Am. Stat. Assoc., 575-583 (1984).
-
(1984)
J. Am. Stat. Assoc.
, pp. 575-583
-
-
Picard, R.1
Cook, R.2
-
20
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
ACM
-
Rabek, J., Khazan, R., Lewandowski, S., Cunningham, R.: Detection of injected, dynamically generated, and obfuscated malicious code. In: Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 76-82. ACM (2003).
-
(2003)
In: Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 76-82
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
22
-
-
46749145715
-
On preventing intrusions by process behavior monitoring
-
Sekar, R., Bowen, T., Segal, M.: On preventing intrusions by process behavior monitoring. In: USENIX Intrusion Detection, Workshop, vol. 1999 (1999).
-
(1999)
In: USENIX Intrusion Detection, Workshop
, vol.1999
-
-
Sekar, R.1
Bowen, T.2
Segal, M.3
-
23
-
-
84876454885
-
Data mining methods for malware detection
-
Siddiqui, M.: Data mining methods for malware detection. ProQuest (2008).
-
(2008)
ProQuest
-
-
Siddiqui, M.1
-
24
-
-
21644475665
-
Static analyzer of vicious executables (save)
-
IEEE
-
Sung, A., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (save). In: Computer Security Applications Conference, 2004. 20th Annual, pp. 326-334. IEEE (2004).
-
(2004)
In: Computer Security Applications Conference, 2004. 20th Annual
, pp. 326-334
-
-
Sung, A.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
26
-
-
79957806740
-
Combining static and dynamic analysis for the detection of malicious documents
-
ACM
-
Tzermias, Z., Sykiotakis, G., Polychronakis, M., Markatos, E.: Combining static and dynamic analysis for the detection of malicious documents. In: Proceedings of the Fourth European Workshop on System Security, p. 4. ACM (2011).
-
(2011)
In: Proceedings of the Fourth European Workshop on System Security
, pp. 4
-
-
Tzermias, Z.1
Sykiotakis, G.2
Polychronakis, M.3
Markatos, E.4
-
27
-
-
0034836394
-
Intrusion detection via static analysis
-
S & P 2001. Proceedings. 2001 IEEE Symposium on,. IEEE
-
Wagner, D., Dean, R.: Intrusion detection via static analysis. In: Security and Privacy, 2001. S & P 2001. Proceedings. 2001 IEEE Symposium on, pp. 156-168. IEEE (2001).
-
(2001)
In: Security and Privacy, 2001
, pp. 156-168
-
-
Wagner, D.1
Dean, R.2
-
28
-
-
80052930844
-
-
Xu, J., Sung, A., Chavez, P.: Mukkamala, S.: Polymorphic malicious executable scanner by api sequence analysis (2004).
-
(2004)
Polymorphic malicious executable scanner by api sequence analysis
-
-
Xu, J.1
Sung, A.2
Chavez, P.3
Mukkamala, S.4
-
29
-
-
36849096063
-
Imds: Intelligent malware detection system
-
ACM
-
Ye, Y., Wang, D., Li, T., Ye, D.: Imds: Intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1043-1047. ACM (2007).
-
(2007)
In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1043-1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
|