-
3
-
-
21644475665
-
Static analyzer of vicious executables
-
A. Sung, J. Xu, P. Chavez, and S. Mukkamala, "Static analyzer of vicious executables," in Annual Computer Security Appl Conf, 2004, pp. 326-334.
-
(2004)
Annual Computer Security Appl Conf
, pp. 326-334
-
-
Sung, A.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
5
-
-
33746864380
-
Detection of new malicious code using n-grams signatures
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan, "Detection of new malicious code using n-grams signatures," in Proc of the 2nd Annual Conf on Privacy, Security, and Trust, 2004, pp. 193-196.
-
(2004)
Proc of the 2nd Annual Conf on Privacy, Security, and Trust
, pp. 193-196
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
6
-
-
84883080793
-
Are metamorphic viruses really invincible
-
A. Lakhotia, A. Kapoor, and E. Kumar, "Are metamorphic viruses really invincible," Virus Bulletin, vol. 12, p. 57, 2004.
-
(2004)
Virus Bulletin
, vol.12
, pp. 57
-
-
Lakhotia, A.1
Kapoor, A.2
Kumar, E.3
-
7
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Andersen, Z. Morleymao, and F. Jahanian, "Automated classification and analysis of internet malware," in In Proc of Recent Advances in Intrusion Detection, 2007.
-
(2007)
Proc of Recent Advances in Intrusion Detection
-
-
Bailey, M.1
Andersen, J.2
Morleymao, Z.3
Jahanian, F.4
-
8
-
-
70349696809
-
-
Springer
-
V. Chandola, E. Eilertson, L. Ertoz, G. Simon, and V. Kumar, Data mining and cyber security. Springer, 2006, pp. 83-103.
-
(2006)
Data Mining and Cyber Security
, pp. 83-103
-
-
Chandola, V.1
Eilertson, E.2
Ertoz, L.3
Simon, G.4
Kumar, V.5
-
9
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection," in USENIX Security Symposium, 2008, pp. 139-154.
-
(2008)
USENIX Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
12244311689
-
A taxonomy of computer worms
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proc of the 2003 ACM Workshop on Rapid Malcode, 2003, pp. 11-18.
-
(2003)
Proc of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
11
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Symposium on Applications and the Internet (SAINT), 2003.
-
(2003)
Symposium on Applications and the Internet (SAINT)
-
-
Sung, A.H.1
Mukkamala, S.2
-
12
-
-
62949089985
-
A new maximal margin spherical structured multi class support vector machine
-
P.-Y. Hao, J.-H. Chiang, and Y.-H. Lin, "A new maximal margin spherical structured multi class support vector machine," Applied Intelligence, vol. 30, pp. 98-111, 2009.
-
(2009)
Applied Intelligence
, vol.30
, pp. 98-111
-
-
Hao, P.-Y.1
Chiang, J.-H.2
Lin, Y.-H.3
-
13
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
|