-
1
-
-
2342556574
-
Intelligent automatic malicious code signatures extraction
-
Deng, P.S., Wang, J.H., Shieh, W.G., Yen, C.P., Tung, C.T.: 'Intelligent automatic malicious code signatures extraction'. Proc. IEEE 37th Annual 2003 Int. Carnahan Conf., 2003, pp. 600-603
-
(2003)
Proc. IEEE 37th Annual 2003 Int. Carnahan Conf
, pp. 600-603
-
-
Deng, P.S.1
Wang, J.H.2
Shieh, W.G.3
Yen, C.P.4
Tung, C.T.5
-
2
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
Jacob, G., Debar, H., Filiol, E.: 'Behavioral detection of malware: From a survey towards an established taxonomy', J. Comput. Virol., 2008, 4, (3), pp. 251-266
-
(2008)
J. Comput. Virol
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
4
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
-
Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: 'Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey', Inf. Sec. Tech. Rep., 2009, 14, (1), pp. 16-29
-
(2009)
Inf. Sec. Tech. Rep
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
5
-
-
60649088031
-
Opcodes as predictor for malware
-
Bilar, D.: 'Opcodes as predictor for malware', Int. J. Electron. Sec. Digit. Forensics, 2007, 1, (2), pp. 156-168
-
(2007)
Int. J. Electron. Sec. Digit. Forensics
, vol.1
, Issue.2
, pp. 156-168
-
-
Bilar, D.1
-
6
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: 'Data mining methods for detection of new malicious executables'. Proc. Security and Privacy, 2001, pp. 38-49
-
(2001)
Proc. Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, F.3
Stolfo, S.J.4
-
7
-
-
62849117735
-
Data mining methods for malware detection using instruction sequences
-
Siddiqui, M., Wang, M.C., Lee, J.: 'Data mining methods for malware detection using instruction sequences'. Proc. 26th IASTED Int. Conf. Artificial Intelligence and Applications, 2008, pp. 358-363
-
(2008)
Proc. 26th IASTED Int. Conf. Artificial Intelligence and Applications
, pp. 358-363
-
-
Siddiqui, M.1
Wang, M.C.2
Lee, J.3
-
8
-
-
58849157332
-
Unknown malcode detection using opcode representation
-
Moskovitch, R., Feher, C., Tzachar, N., et al.: 'Unknown malcode detection using opcode representation'. Proc. European Conf. Intelligence and Security Informatics, Esbjerg, Denmark, 2008, pp. 204-215
-
(2008)
Proc. European Conf. Intelligence and Security Informatics, Esbjerg, Denmark
, pp. 204-215
-
-
Moskovitch, R.1
Feher, C.2
Tzachar, N.3
-
9
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
Santos, I., Brezo, F., Nieves, J., et al.: 'Idea: Opcode-sequence-based malware detection', Eng. Sec. Softw. Syst., LNCS, 2010, 5965, pp. 35-43
-
(2010)
Eng. Sec. Softw. Syst., LNCS
, vol.5965
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
-
10
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
doi: 10.1016/j.ins.2011.08.020
-
Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: 'Opcode sequences as representation of executables for data-mining-based unknown malware detection'. Information Sciences, 2011, doi: 10.1016/j.ins.2011.08.020
-
(2011)
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
11
-
-
84872176999
-
Detecting unknown malicious code by applying classification techniques on opcode patterns
-
Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., Elovici, Y.: 'Detecting unknown malicious code by applying classification techniques on opcode patterns', Secur. Inf., 2012, 1, (1), pp. 1-22
-
(2012)
Secur. Inf
, vol.1
, Issue.1
, pp. 1-22
-
-
Shabtai, A.1
Moskovitch, R.2
Feher, C.3
Dolev, S.4
Elovici, Y.5
-
12
-
-
84873872819
-
An unknown malware detection scheme based on the features of graph
-
doi: 10.1002/sec.524
-
Zhao, Z., Wang, J., Wang, C.: 'An unknown malware detection scheme based on the features of graph'. Security and Communication Networks, 2012, doi: 10.1002/sec.524
-
(2012)
Security and Communication Networks
-
-
Zhao, Z.1
Wang, J.2
Wang, C.3
-
14
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y.: 'Unknown malcode detection via text categorization and the imbalance problem'. Proc. Intelligence and Security Informatics, 2008, pp. 156-161
-
(2008)
Proc. Intelligence and Security Informatics
, pp. 156-161
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
15
-
-
76649143365
-
Pe-miner: Mining structural information to detect malicious executables in realtime
-
France, September
-
Shafiq, M., Tabish, S., Mirza, F., Farooq, M.: 'Pe-miner: Mining structural information to detect malicious executables in realtime'. Int. Symp. Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, France, September 2009, pp. 121-141
-
(2009)
Int. Symp. Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science
, pp. 121-141
-
-
Shafiq, M.1
Tabish, S.2
Mirza, F.3
Farooq, M.4
-
17
-
-
0020935083
-
Formalizing reusable software components
-
Newport, RI September
-
Rich, C., Waters, R.C.: 'Formalizing reusable software components'. Proc. Workshop on Reusability in Programming, Newport, RI, September 1983, pp. 152-158
-
(1983)
Proc. Workshop on Reusability in Programming
, pp. 152-158
-
-
Rich, C.1
Waters, R.C.2
-
18
-
-
84889377893
-
-
Wiley-Interscience
-
Markov, Z., Larose, D.T.: 'Data mining the Web: Uncovering patterns in Web content, structure, and usage' (Wiley-Interscience, 2007)
-
(2007)
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
-
-
Markov, Z.1
Larose, D.T.2
-
19
-
-
0030211964
-
Bagging predictors
-
Breiman, L.: 'Bagging predictors', Mach. Learn., 1996, 24, (2), pp. 123-140
-
(1996)
Mach. Learn
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
20
-
-
0035478854
-
Random forests
-
Breiman, L.: 'Random forests', Mach. Learn., 2001, 45, (1), pp. 5-32
-
(2001)
Mach. Learn
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
21
-
-
84890585063
-
-
accessed April 2010
-
http://vx.netlux.org/vl.php, accessed April 2010
-
-
-
-
22
-
-
84991833843
-
-
Morgan Kaufmann
-
Witten, I.H., Frank, E., Hall, M.A.: 'Data Mining: Practical machine learning tools and techniques', (Morgan Kaufmann, 2011)
-
(2011)
Data Mining: Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
|