-
4
-
-
84888614014
-
-
KALPA
-
KALPA, "Introduction to Malware", "http:// securityresearch.in/index.php/projects/malware
-
(2011)
Introduction to Malware
-
-
-
5
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
G. Jacob, H. Debar, and E. Filiol, "Behavioral detection of malware: from a survey towards an established taxonomy," Journal in Computer Virology, pp. 251-266, 2008.
-
(2008)
Journal in Computer Virology
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
6
-
-
85088340649
-
Malware detection based on hybrid signature behaviour application programming interface call graph information assurance and security research group
-
A. Ahmed, E. Elhadi, M. A. Maarof and A. H. Osman, "Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph Information Assurance and Security Research Group.," Journal, A., Sciences, A., & Publications, S., Faculty of Computer Science and Information Systems, 9(3), 283-288, 2012.
-
(2012)
Journal, A., Sciences, A., & Publications, S., Faculty of Computer Science and Information Systems
, vol.9
, Issue.3
, pp. 283-288
-
-
Ahmed, A.1
Elhadi, E.2
Maarof, M.A.3
Osman, A.H.4
-
8
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
IEEE COMPUTER SOCIETY
-
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, "Data mining methods for detection of new malicious executables.," in IEEE Symposium on Security and Privacy, pages 38-49. IEEE COMPUTER SOCIETY, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
10
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls.," Journal of Computer Security, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
11
-
-
34250666936
-
Static detection of malicious code in executable programs
-
J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, and N. Tawbi, "Static detection of malicious code in executable programs.," Int. J. of Req. Eng., 2001.
-
(2001)
Int. J. of Req. Eng.
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.M.4
Tawbi, N.5
-
12
-
-
1342274727
-
A fast automaton-based approach for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati, "A Fast Automaton-Based Approach for Detecting Anomalous Program Behaviors.," in IEEE Symposium on Security and Privacy, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
13
-
-
21644475665
-
Static analyzer of vicious executables
-
A. H. Sung, J. Xu, P. Chavez, and S. Mukkamala, "Static Analyzer of Vicious Executables.," in 20th Annual Computer Security Applications Conference, pp. 326-334, 2004.
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
14
-
-
36849096063
-
IMDS: Intelligent malware detection system
-
Y. Ye, D. Wang, T. Li, and D. Ye, "IMDS: Intelligent malware detection system," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, pp. 1043-1047, 2007.
-
(2007)
Proc. ACM Int. Conf. Knowl. Discovery Data Mining
, pp. 1043-1047
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
-
15
-
-
77951206726
-
CIMDS: Adapting postprocessing techniques of associative classification for malware detection
-
Y. Ye, T. Li, Q. Jiang, and Y. Wang, "CIMDS: adapting postprocessing techniques of associative classification for malware detection," IEEE Trans. Syst., Man, Cybern. C, Vol. 40, no. 3, pp. 298-307, 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. C
, vol.40
, Issue.3
, pp. 298-307
-
-
Ye, Y.1
Li, T.2
Jiang, Q.3
Wang, Y.4
-
17
-
-
84888624862
-
Code graph for malware detection. In information networking
-
International Conference on, Jan
-
K. Jeong and H. Lee, "Code graph for malware detection. In Information Networking.," ICOIN. International Conference on, Jan 2008.
-
(2008)
ICOIN
-
-
Jeong, K.1
Lee, H.2
-
18
-
-
77954746422
-
Detecting metamorphic malwares using code graphs
-
ser. New York, NY, USA: ACM
-
J. Lee, K. Jeong, and H. Lee, "Detecting metamorphic malwares using code graphs," in Proceedings of the ACM Symposium on Applied Computing, ser. New York, NY, USA: ACM, pp. 1970-1977, 2010.
-
(2010)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1970-1977
-
-
Lee, J.1
Jeong, K.2
Lee, H.3
-
19
-
-
77954348690
-
Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list
-
Y. Ye, T. Li, K. Huang, Q. Jiang and Y. Chen, "Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list,". Journal of Intelligent Information Systems, 35(1), pp. 1-20. 2010.
-
(2010)
Journal of Intelligent Information Systems
, vol.35
, Issue.1
, pp. 1-20
-
-
Ye, Y.1
Li, T.2
Huang, K.3
Jiang, Q.4
Chen, Y.5
-
20
-
-
60649088031
-
OpCodes as predictor for malware
-
D. Bilar, "OpCodes as predictor for malware," International Journal of Electronic Security and Digital Forensics, Vol. 1, no. 2, p. 156, 2007.
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.2
, pp. 156
-
-
Bilar, D.1
-
21
-
-
78651385000
-
Idea: OpCode-sequence-based malware detection
-
I. Santos, F. Brezo, J. Nieves, and Y. Penya, "Idea: OpCode-sequence-based malware detection,", Engineering Secure Software and System, 2010.
-
(2010)
Engineering Secure Software and System
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, Y.4
-
22
-
-
24344458137
-
Feature selection based on mutual information: Cri-teria of max-dependency, max-relevance, and min-redundancy
-
C. Peng, H. Long and F. Ding, "Feature selection based on mutual information: cri-teria of max-dependency, max-relevance, and min-redundancy.," in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005.
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
-
-
Peng, C.1
Long, H.2
Ding, F.3
-
23
-
-
84861726546
-
OpCode sequences as representation of executables for data-mining-based unknown malware detection
-
Aug.
-
I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas, "OpCode sequences as representation of executables for data-mining-based unknown malware detection," Information Sciences, Aug. 2011.
-
(2011)
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
25
-
-
82055172109
-
Using opCode sequences in single-class learning to detect unknown malware
-
I. Santos, F. Brezo, B. Sanz, C. Laorden, and P. G. Bringas, "Using opCode sequences in single-class learning to detect unknown malware," IET Information Security, Vol. 5, no. 4, p. 220, 2011.
-
(2011)
IET Information Security
, vol.5
, Issue.4
, pp. 220
-
-
Santos, I.1
Brezo, F.2
Sanz, B.3
Laorden, C.4
Bringas, P.G.5
-
27
-
-
84860621757
-
OpCode graph similarity and metamorphic detection
-
Apr.
-
N. Runwal, R. M. Low, and M. Stamp, "OpCode graph similarity and metamorphic detection," Journal in Computer Virology, Vol. 8, no. 1-2, pp. 37-52, Apr. 2012.
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1-2
, pp. 37-52
-
-
Runwal, N.1
Low, R.M.2
Stamp, M.3
-
28
-
-
84872176999
-
Detecting unknown malicious code by applying classification techniques on OpCode patterns
-
A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, and Y. Elovici, "Detecting unknown malicious code by applying classification techniques on OpCode patterns," Security Informatics, Vol. 1, no. 1, p. 1, 2012.
-
(2012)
Security Informatics
, vol.1
, Issue.1
, pp. 1
-
-
Shabtai, A.1
Moskovitch, R.2
Feher, C.3
Dolev, S.4
Elovici, Y.5
-
31
-
-
2342473490
-
Automatically generated win32 heuristic virus detection
-
W.A.
-
W. A. and G Tesauro, "Automatically Generated Win32 Heuristic Virus Detection," in Virus Bulletin Conference, 2000.
-
(2000)
Virus Bulletin Conference
-
-
Tesauro, G.1
-
34
-
-
33846600066
-
Comparison of feature selection and classification algorithms in identifying malicious executables
-
T. J. Cai DM, M. Gokhale, "Comparison of feature selection and classification algorithms in identifying malicious executables," in Computational Statistics and Data Analysis, 2007.
-
(2007)
Computational Statistics and Data Analysis
-
-
Cai, T.J.D.M.1
Gokhale, M.2
-
35
-
-
70350619738
-
Unknown malcode detection and the imbalance problem
-
E. Y. Moskovitch, D. Stopel, C. Feher, N. Nissim and N. Japkowicz, "Unknown malcode detection and the imbalance problem," journal in Computer Virology, 2009.
-
(2009)
Journal in Computer Virology
-
-
Moskovitch, E.Y.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Japkowicz, N.5
-
39
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Büschkes, R. and Laskov, P. (eds) Springer, Berlin
-
D. Bruschi, L. Martignoni and M. Monga "Detecting self-mutating malware using control-flow graph matching," In: Büschkes, R. and Laskov, P. (eds) Detection of Intrusions and Malware & Vulnerability Assessment, Volume 4064 of LNCS, pp 129-143. Springer, Berlin. 2006.
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment, Volume 4064 of LNCS
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
41
-
-
0002337827
-
Machine learning and data mining
-
T. M. Mitchell, "Machine learning and data mining," Commun. ACM, Vol. 42, no. 11, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.11
-
-
Mitchell, T.M.1
-
42
-
-
0030211964
-
Bagging predictors
-
L. Breiman. "Bagging Predictors.," Machine Learning, 24(2):123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
43
-
-
0035478854
-
Random forests
-
L. Breiman. "Random Forests.," Machine Learning, 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
46
-
-
83755220464
-
Using multi-feature and classifier ensembles to improve malware detection
-
Y. Lu, S. Din, C. Zheng and B. Gao "Using multi-feature and classifier ensembles to improve malware detection,". Journal of CCIT 39(2), 57-72. 2010.
-
(2010)
Journal of CCIT
, vol.39
, Issue.2
, pp. 57-72
-
-
Lu, Y.1
Din, S.2
Zheng, C.3
Gao, B.4
-
47
-
-
80052681285
-
Combinig file content and file relations for cloud based malware detection
-
Y. Ye, T. Li, S. Zhu, W. Zhuang, E. Tas, U. Gupta and M. Abdulhayoglu, "Combinig File Content and File Relations for Cloud Based Malware Detection.," Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, 2011.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Ye, Y.1
Li, T.2
Zhu, S.3
Zhuang, W.4
Tas, E.5
Gupta, U.6
Abdulhayoglu, M.7
|