-
1
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Springer-Verlag
-
M. Bailey, J. Oberheide, J. Andersen, Z.M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th international conference on Recent advances in intrusion detection, pp. 178-197. Springer-Verlag, 2007.
-
(2007)
Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
2
-
-
74549138307
-
N-gramsbased file signatures for malware detection
-
AIDSS
-
I. Santos, Y. Penya, J. Devesa, and P. Bringas. N-gramsbased file signatures for malware detection. In Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS), pp. 317-320. AIDSS, 2009.
-
(2009)
Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS)
, pp. 317-320
-
-
Santos, I.1
Penya, Y.2
Devesa, J.3
Bringas, P.4
-
3
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Springer
-
M.E. Karim, A. Walenstein, A. Lakhotia, and L. Parida. Malware phylogeny generation using permutations of code. In Journal in Computer Virology, Vol. 1, pp. 13-23. Springer, 2005.
-
(2005)
Journal in Computer Virology
, vol.1
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
4
-
-
80052143641
-
Towards efficient analysis for malware in the wild
-
IEEE
-
M. Iwamura, M. Itoh, and Y. Muraoka. Towards efficient analysis for malware in the wild. In Communications (ICC), 2011 IEEE International Conference, pp. 1-6. IEEE, 2011.
-
(2011)
Communications (ICC), 2011 IEEE International Conference
, pp. 1-6
-
-
Iwamura, M.1
Itoh, M.2
Muraoka, Y.3
-
5
-
-
0141828444
-
Speedingup hirschberg and hunt-szymanski lcs algorithms
-
IOS Press
-
M. Crochemore, C.S. Iliopoulos, Y.J. Pinzon, et al. Speedingup hirschberg and hunt-szymanski lcs algorithms. In Fundamenta Informaticae, Vol. 56, pp. 89-103. IOS Press, 2003.
-
(2003)
Fundamenta Informaticae
, vol.56
, pp. 89-103
-
-
Crochemore, M.1
Iliopoulos, C.S.2
Pinzon, Y.J.3
-
7
-
-
80255126150
-
Malware classification based on call graph clustering
-
Springer
-
J. Kinable and O. Kostakis. Malware classification based on call graph clustering. In Journal in Computer Virology, Vol. 7, pp. 233-245. Springer, 2011.
-
(2011)
Journal in Computer Virology
, vol.7
, pp. 233-245
-
-
Kinable, J.1
Kostakis, O.2
-
8
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
IEEE
-
J. Mayrand, C. Leblanc, and E.M. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Software Maintenance 1996, Proceedings., International Conference, pp. 244-253. IEEE, 1996.
-
(1996)
Software Maintenance 1996, Proceedings., International Conference
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.M.3
-
11
-
-
0342289701
-
Methods for demonstrating resemblance in taxonomy and ecology
-
AV Hall. Methods for demonstrating resemblance in taxonomy and ecology. In Nature, Vol. 214, pp. 830-831, 1967.
-
(1967)
Nature
, vol.214
, pp. 830-831
-
-
Hall, A.V.1
-
12
-
-
0024855526
-
An efficient sequential clustering method
-
Elsevier
-
P. Trahanias and E. Skordalakis. An efficient sequential clustering method. In Pattern recognition, Vol. 22, pp. 449-453. Elsevier, 1989.
-
(1989)
Pattern Recognition
, vol.22
, pp. 449-453
-
-
Trahanias, P.1
Skordalakis, E.2
-
13
-
-
0016518550
-
A linear space algorithm for computing maximal common subsequences
-
ACM
-
D.S. Hirschberg. A linear space algorithm for computing maximal common subsequences. In Communications of the ACM, Vol. 18, pp. 341-343. ACM, 1975.
-
(1975)
Communications of the ACM
, vol.18
, pp. 341-343
-
-
Hirschberg, D.S.1
-
15
-
-
84891318787
-
Function estimation method for malwares based on part of binary code
-
IPSJ
-
Okubo R, Morii M, Isawa R, Inoue D, and Nakao K. Function estimation method for malwares based on part of binary code. In Computer Security Symposium, pp. 9-14. IPSJ, 2012.
-
(2012)
Computer Security Symposium
, pp. 9-14
-
-
Okubo, R.1
Morii, M.2
Isawa, R.3
Inoue, D.4
Nakao, K.5
-
16
-
-
77950115244
-
An automated classification system based on the strings of trojan and virus families
-
IEEE
-
R. Tian, L. Batten, R. Islam, and S. Versteeg. An automated classification system based on the strings of trojan and virus families. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pp. 23-30. IEEE, 2009.
-
(2009)
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
, pp. 23-30
-
-
Tian, R.1
Batten, L.2
Islam, R.3
Versteeg, S.4
-
17
-
-
84891280008
-
Malware classification based on svm and labeling by api's tendency
-
IPSJ
-
Usui T, Shigematsu K, Takeda K, and Murai J. Malware classification based on svm and labeling by api's tendency. In Computer Security Symposium, pp. 797-802. IPSJ, 2011.
-
(2011)
Computer Security Symposium
, pp. 797-802
-
-
Usui, T.1
Shigematsu, K.2
Takeda, K.3
Murai, J.4
-
18
-
-
26944454497
-
Roc graphs: Notes and practical considerations for researchers
-
T. Fawcett. Roc graphs: Notes and practical considerations for researchers. In Machine Learning, Vol. 31, pp. 1-38, 2004.
-
(2004)
Machine Learning
, vol.31
, pp. 1-38
-
-
Fawcett, T.1
|