-
1
-
-
67349123665
-
Profile hidden Markov models and metamorphic virus detection
-
Attaluri, S., McGhee, S., Stamp, M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151-169 (2009).
-
(2009)
J. Comput. Virol.
, vol.5
, Issue.2
, pp. 151-169
-
-
Attaluri, S.1
McGhee, S.2
Stamp, M.3
-
4
-
-
84880601775
-
-
Baysa, D., Low, R. M., Stamp, M.: Structural entropy and metamorphic malware, submitted.
-
Structural entropy and metamorphic malware, submitted
-
-
Baysa, D.1
Low, R.M.2
Stamp, M.3
-
6
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 30-40 (2008).
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.3
, pp. 30-40
-
-
Borello, J.1
Me, L.2
-
7
-
-
0031191630
-
The use of the area under the roc curve in the evaluation of machine learning algorithms
-
Bradley, A. P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit. 30, 1145-1159 (1997).
-
(1997)
Pattern Recognit.
, vol.30
, pp. 1145-1159
-
-
Bradley, A.P.1
-
8
-
-
84880587932
-
-
Cygwin, Cygwin Utility Files
-
Cygwin, Cygwin Utility Files, http://www. cygwin. com/.
-
-
-
-
9
-
-
78651067505
-
-
Master's report, Department of Computer Science, San Jose State University
-
Desai, P.: Towards an undetectable computer virus, Master's report, Department of Computer Science, San Jose State University (2008). http://scholarworks. sjsu. edu/etd_projects/90/.
-
(2008)
Towards an undetectable computer virus
-
-
Desai, P.1
-
10
-
-
84880626011
-
-
Master's report, Department of Computer Science, San Jose State University
-
Deshpande, S.: Eigenvalue Analysis for Metamorphic Detection, Master's report, Department of Computer Science, San Jose State University (2012). http://scholarworks. sjsu. edu/etd_projects/279/.
-
(2012)
Eigenvalue Analysis for Metamorphic Detection
-
-
Deshpande, S.1
-
11
-
-
84880630211
-
Efficient cryptanalysis of homophonic substitution ciphers
-
Dhavare, A., Low, R. M., Stamp, M.: Efficient cryptanalysis of homophonic substitution ciphers. to appear in Cryptologia.
-
Cryptologia
-
-
Dhavare, A.1
Low, R.M.2
Stamp, M.3
-
12
-
-
35348995283
-
Metamorphism, formal grammars and undecidable code mutation
-
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2, 70-75 (2007).
-
(2007)
Int. J. Comput. Sci.
, vol.2
, pp. 70-75
-
-
Filiol, E.1
-
13
-
-
56549084673
-
-
Technical report, Department of Computer Science, Purdue University
-
Idika, N., Mathur, A.: A Survey of Malware Detection Techniques, Technical report, Department of Computer Science, Purdue University (2007). http://www. serc. net/system/files/SERC-TR-286. pdf.
-
(2007)
A Survey of Malware Detection Techniques
-
-
Idika, N.1
Mathur, A.2
-
15
-
-
34248350860
-
A fast method for the cryptanalysis of substitution ciphers
-
Jakobsen, T.: A fast method for the cryptanalysis of substitution ciphers. Cryptologia 19, 265-274 (1995).
-
(1995)
Cryptologia
, vol.19
, pp. 265-274
-
-
Jakobsen, T.1
-
16
-
-
79960582590
-
Hunting for undetectable metamorphic viruses
-
Lin, D., Stamp, M.: Hunting for undetectable metamorphic viruses. J. Comput. Virol. 7(3), 201-214 (2011).
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.3
, pp. 201-214
-
-
Lin, D.1
Stamp, M.2
-
18
-
-
84860607459
-
-
Master's report, Department of Computer Science, San Jose State University
-
Patel, M.: Similarity Tests for Metamorphic Virus Detection, Master's report, Department of Computer Science, San Jose State University, (2011). http://scholarworks. sjsu. edu/etd_projects/175/.
-
(2011)
Similarity Tests for Metamorphic Virus Detection
-
-
Patel, M.1
-
19
-
-
82955239645
-
Evolution of computer virus concealment and anti-virus techniques: a short survey
-
Rad, B. B., Masrom, M., Ibrahim, S.: Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI Int. J. Comput. Sci. Issues 8(1) (2011). http://arxiv. org/pdf/1104. 1070. pdf.
-
(2011)
IJCSI Int. J. Comput. Sci. Issues
, vol.8
, Issue.1
-
-
Rad, B.B.1
Masrom, M.2
Ibrahim, S.3
-
20
-
-
84860621757
-
Opcode graph similarity and metamorphic detection
-
Runwal, N., Low, R. M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1-2), 37-52 (2012).
-
(2012)
J. Comput. Virol.
, vol.8
, Issue.1-2
, pp. 37-52
-
-
Runwal, N.1
Low, R.M.2
Stamp, M.3
-
21
-
-
84880579283
-
-
Master's report, Department of Computer Science, San Jose State University
-
Shanmugam, G.: Simple Substitution Distance and Metamorphic Detection, Master's report, Department of Computer Science, San Jose State University (2012). http://scholarworks. sjsu. edu/etd_projects/270/.
-
(2012)
Simple Substitution Distance and Metamorphic Detection
-
-
Shanmugam, G.1
-
22
-
-
84880634325
-
-
Snakebyte. Next Generation Virus Construction Kit (NGVCK)
-
Snakebyte. Next Generation Virus Construction Kit (NGVCK) (2000). http://vx. netlux. org/vx. php?id=tn02.
-
(2000)
-
-
-
23
-
-
80255131297
-
Comparing files using structural entropy
-
Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259-265 (2011).
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.4
, pp. 259-265
-
-
Sorokin, I.1
-
24
-
-
84893005301
-
Metamorphic worm that carries its own morphing engine
-
to appear in
-
Sridhara, S. M., Stamp, M.: Metamorphic worm that carries its own morphing engine. to appear in J. Comput. Virol.
-
J. Comput. Virol.
-
-
Sridhara, S.M.1
Stamp, M.2
-
28
-
-
84880613106
-
Chi-squared distance and metamorphic virus detection
-
to appear in
-
Toderici, A. H., Stamp, M.: Chi-squared distance and metamorphic virus detection. to appear in J. Comput. Virol.
-
J. Comput. Virol.
-
-
Toderici, A.H.1
Stamp, M.2
-
30
-
-
33751208937
-
Hunting for metamorphic engines
-
Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211-229 (2006).
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.3
, pp. 211-229
-
-
Wong, W.1
Stamp, M.2
-
31
-
-
70349989094
-
Code mutation techniques by means of formal grammars and automatons
-
Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199-207 (2009).
-
(2009)
J. Comput. Virol.
, vol.5
, Issue.3
, pp. 199-207
-
-
Zbitskiy, P.1
|