-
1
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer
-
K. Rieck, T. Holz, P. Dussel, and P. Laskov, "Learning and classification of malware behavior" in Conference on Detection of Intrusions and Malware & Vulnerability Assessment Heidelberg, Springer, 2007, pp. 108-125.
-
(2007)
Conference on Detection of Intrusions and Malware & Vulnerability Assessment Heidelberg
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Dussel, P.3
Laskov, P.4
-
2
-
-
84881423917
-
Monitoring analysis and filtering system for purifying network traffic of known and unknown malicious content
-
A. Shabtai, D. Potashnik, Y. Fledel, R. Moskovitch, and E. Elovici, "Monitoring analysis and filtering system for purifying network traffic of known and unknown malicious content" Security and Communication Networks, 2010.
-
(2010)
Security and Communication Networks
-
-
Shabtai, A.1
Potashnik, D.2
Fledel, Y.3
Moskovitch, R.4
Elovici, E.5
-
4
-
-
0034838197
-
Data mining methods for detection of new malicious excutables
-
M. G. Schultz, E. Eskin, E. Zadok and S. J. Stolfo, "Data Mining Methods for Detection of New Malicious Excutables" Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001, pp. 38-49.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
6
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof, "Learning to Detect and Classify Malicious Executables in the Wild" Journal of Machine Learning Research, 2006, pp. 2721-2744.
-
(2006)
Journal of Machine Learning Research
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
8
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Spinger
-
M. Baily, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian and J. Nazario, "Automated classification and analysis of internet malware" Lecture Notes in Computer Science, Spinger, pp. 178-197.
-
Lecture Notes in Computer Science
, pp. 178-197
-
-
Baily, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
9
-
-
84875656430
-
Exploiting similarity between variants to defeat malware
-
A. Walenstein, M. Venable, M. Hayes, C. Thompson, and A. Lakhotia, "Exploiting similarity between variants to defeat malware" Proceeding of BlackHat 2007 DC Briefings, 2007.
-
(2007)
Proceeding of BlackHat 2007 DC Briefings
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
10
-
-
84881421327
-
-
VX Heavens Virus Collection, VX Heavens website, available at http://vx.netlux.org
-
VX Heavens Website
-
-
-
11
-
-
84881451782
-
-
IDA-Pro Tool, available at http://www.hex-rays.com
-
IDA-Pro Tool
-
-
-
12
-
-
84881429775
-
Mining a data reasoning model for personalized text classification
-
L. Pipanmaekaporn and Y. Li, "Mining a Data Reasoning Model for Personalized Text Classification" IEEE Intelligent Informatics Bulletin, 2011, pp. 17-24.
-
(2011)
IEEE Intelligent Informatics Bulletin
, pp. 17-24
-
-
Pipanmaekaporn, L.1
Li, Y.2
-
14
-
-
85115260483
-
Floating search methods for feature selection with nonmonotonic criterion functions
-
P. Pudil, F. J. Ferri, J. Novovicova and J. Kittler, "Floating search methods for feature selection with nonmonotonic criterion functions" International Conference on Pattern Recognition, 1994, pp. 279-283.
-
(1994)
International Conference on Pattern Recognition
, pp. 279-283
-
-
Pudil, P.1
Ferri, F.J.2
Novovicova, J.3
Kittler, J.4
-
16
-
-
2342663706
-
Virus detection using data mining techniques
-
J. H. Wang, P. S. Deng, Y. S. Fan, L. J. Jaw and Y. C. Liu, "Virus Detection Using Data Mining Techniques" In Proceedings of the IEEE 37th Annual International Conference on security Technology, 2003, pp. 71-76.
-
(2003)
Proceedings of the IEEE 37th Annual International Conference on Security Technology
, pp. 71-76
-
-
Wang, J.H.1
Deng, P.S.2
Fan, Y.S.3
Jaw, L.J.4
Liu, Y.C.5
-
17
-
-
70449654401
-
Automatic classification of executable code for computer virus detection
-
Springer, Poland
-
P. Kierski, M. Okoniewski, P. Gawrysiak, "Automatic Classification of Executable Code for Computer Virus Detection" International Conference on Intelligent Information Systems, Springer, Poland, 2003, pp. 277-284.
-
(2003)
International Conference on Intelligent Information Systems
, pp. 277-284
-
-
Kierski, P.1
Okoniewski, M.2
Gawrysiak, P.3
-
18
-
-
84881404242
-
-
KfNgram, available at http://www.kwicfinder.com/kfNgram
-
-
-
-
20
-
-
0003500248
-
C4.5: Programs for machine learning
-
J. Ross Quinlan, "C4.5: Programs for Machine Learning" Morgan Kaufman, 1993.
-
(1993)
Morgan Kaufman
-
-
Ross Quinlan, J.1
-
22
-
-
84881455915
-
-
LIBSVM Tool, available at http://www.csie.ntu.edu.tw/~cjlin/
-
-
-
-
23
-
-
0023294949
-
Computer virus theory and experiments
-
F. Cohen, "Computer Virus Theory and experiments", Computers and Security 6, 1987, pp. 22-35.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
26
-
-
33745760747
-
Static disassembly of obfuscated binaries
-
San Diego, CA
-
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna, "Static disassembly of obfuscated binaries", In Proceedings of USENIX Security, San Diego, CA, 2007, pp. 255-270.
-
(2007)
Proceedings of USENIX Security
, pp. 255-270
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
27
-
-
34247166239
-
Static detection of malicious code in executable programs
-
J. Bergeron, M. Debbabi, J. Desharnais, M. M Erhioui, Y. Lavoie, and N. Tawbi, "Static Detection of Malicious Code in Executable Programs", In Symposium on Requirements Engineering for Information Security, 2001.
-
(2001)
Symposium on Requirements Engineering for Information Security
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Lavoie, Y.5
Tawbi, N.6
-
28
-
-
26944454412
-
Using fuzzy pattern recognition to detect unknown malicious executables code
-
B. Zhang, J. Yin, and J. Hao, "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code", Fuzzy Systems and Knowledge Discovery. LNCS (LNAI), Vol. 3613, 2005, pp. 629-634.
-
(2005)
Fuzzy Systems and Knowledge Discovery. LNCS (LNAI)
, vol.3613
, pp. 629-634
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
-
30
-
-
48649084773
-
OmniUnpack: Fast, generic, and safe unpacking of malware
-
Miami Beach
-
L. Martignoni, M. Christodorescu, and S. Jha, "OmniUnpack: Fast, Generic, and Safe Unpacking of Malware", In Twenty-Third Annual Computer Security Applications Conference (ACSAC), Miami Beach, 2007.
-
(2007)
Twenty-third Annual Computer Security Applications Conference (ACSAC)
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
32
-
-
74549138307
-
N-grams-based file signatures for malware detection
-
I. Santos, Y. K. Penya, J. Devesa, and P. G. Bringas, "n-Grams-Based File Signatures For Malware Detection", The Proceedings of the 11th International Conference on Enterprise Information Systems, Volume AIDSS, 2009, pp. 317-320.
-
(2009)
The Proceedings of the 11th International Conference on Enterprise Information Systems
, vol.AIDSS
, pp. 317-320
-
-
Santos, I.1
Penya, Y.K.2
Devesa, J.3
Bringas, P.G.4
-
33
-
-
27544433210
-
Semantics-aware malware detection
-
May 08-11
-
M. Christodorescu, S. Jha, A. Seshia, D. Song, R. E. Bryant, "Semantics-Aware Malware Detection", In Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 08-11, 2005, pp. 32-46.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, A.3
Song, D.4
Bryant, R.E.5
-
34
-
-
67650160788
-
Source code authorship attribution using n-grams
-
A. Spink, A. Turpin, and M. Wu, Eds. RMIT University, Melbourne, Australia
-
S. Burrows and S. M. M. Tahaghoghi, "Source code authorship attribution using n-grams", In Proceedings of the Twelfth Australasian Document Computing Symposium, A. Spink, A. Turpin, and M. Wu, Eds. RMIT University, Melbourne, Australia, 2007, pp. 32-39.
-
(2007)
Proceedings of the Twelfth Australasian Document Computing Symposium
, pp. 32-39
-
-
Burrows, S.1
Tahaghoghi, S.M.M.2
-
35
-
-
34247150712
-
Effective identification of source code authors using byte-level information
-
ACM Press, Shanghai, China
-
G. Frantzeskou, E. Stamatatos, S. Gritzalis and S. Katsikas, "Effective identification of source code authors using byte-level information", In Proceedings of the Twenty-Eighth International Conference on Software Engineering, ACM Press, Shanghai, China, 2006, pp. 893-896.
-
(2006)
Proceedings of the Twenty-eighth International Conference on Software Engineering
, pp. 893-896
-
-
Frantzeskou, G.1
Stamatatos, E.2
Gritzalis, S.3
Katsikas, S.4
-
36
-
-
77951206726
-
CIMDS: Adapting postprocessing techniques of associative classification for malware detection
-
Y. Ye, T. Li, Q. Jiangshan and Y. Wang, "CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection", IEEE: Applications and Reviews, Vol. 40, No. 3, 2010.
-
(2010)
IEEE: Applications and Reviews
, vol.40
, Issue.3
-
-
Ye, Y.1
Li, T.2
Jiangshan, Q.3
Wang, Y.4
|