-
3
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In RAID, pages 178-197, 2007.
-
(2007)
RAID
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
4
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang. On the analysis of the zeus botnet crimeware toolkit. In PST, pages 31-38, 2010.
-
(2010)
PST
, pp. 31-38
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
6
-
-
80255126150
-
Malware classification based on call graph clustering
-
J. Kinable and O. Kostakis. Malware classification based on call graph clustering. Journal in computer virology, 7(4):233-245, 2011.
-
(2011)
Journal in Computer Virology
, vol.7
, Issue.4
, pp. 233-245
-
-
Kinable, J.1
Kostakis, O.2
-
11
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, N. Modadugu, et al. The ghost in the browser analysis of web-based malware. In HotBots, 2007.
-
(2007)
HotBots
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
12
-
-
78651385858
-
Multi-stage delivery of malware
-
M. Ramilli and M. Bishop. Multi-stage delivery of malware. In MALWARE, pages 91-97, 2010.
-
(2010)
MALWARE
, pp. 91-97
-
-
Ramilli, M.1
Bishop, M.2
-
13
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 108-125, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
14
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4):639-668, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
, pp. 639-668
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
15
-
-
80053652695
-
Collective classification for packed executable identification
-
I. Santos, X. Ugarte-Pedrero, B. Sanz, C. Laorden, and P. G. Bringas. Collective classification for packed executable identification. In ACM CEAS, pages 23-30, 2011.
-
(2011)
ACM CEAS
, pp. 23-30
-
-
Santos, I.1
Ugarte-Pedrero, X.2
Sanz, B.3
Laorden, C.4
Bringas, P.G.5
-
16
-
-
77950115244
-
An automated classification system based on the strings of trojan and virus families
-
R. Tian, L. Batten, R. Islam, and S. Versteeg. An automated classification system based on the strings of trojan and virus families. In MALWARE, pages 23-30, 2009.
-
(2009)
MALWARE
, pp. 23-30
-
-
Tian, R.1
Batten, L.2
Islam, R.3
Versteeg, S.4
-
17
-
-
58149093760
-
Function length as a tool for malware classification
-
R. Tian, L. Batten, and S. Versteeg. Function length as a tool for malware classification. In MALWARE, 2008.
-
(2008)
MALWARE
-
-
Tian, R.1
Batten, L.2
Versteeg, S.3
-
18
-
-
77952127541
-
Malicious executables classification based on behavioral factor analysis
-
IEEE
-
H. Zhao, M. Xu, N. Zheng, J. Yao, and Q. Ho. Malicious executables classification based on behavioral factor analysis. In IC4E, pages 502-506. IEEE, 2010.
-
(2010)
IC4E
, pp. 502-506
-
-
Zhao, H.1
Xu, M.2
Zheng, N.3
Yao, J.4
Ho, Q.5
|