-
2
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
IEEE
-
C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using cwsandbox," Security Privacy, IEEE, Vol. 5, pp. 32-39, 2007.
-
(2007)
Security Privacy
, vol.5
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
3
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. willems, P. Dussel, and P. Laskov, "Learning and classification of malware behavior," in The 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2008.
-
(2008)
The 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
4
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirdaand, X. Zhou, and X. Wang, "Effective and efficient malware detection at the end host," in SSYM'09 Proceedings of the 18th conference on USENIX security symposium, 2009, pp. 351-366.
-
(2009)
SSYM'09 Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirdaand, E.4
Zhou, X.5
Wang, X.6
-
6
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Andersen, Z. Morleymao, and F. Jahanian, "Automated classification and analysis of internet malware," in Proceedings of the 2007 Conference on Recent Advances in Intrusion Detection, 2007.
-
(2007)
Proceedings of the 2007 Conference on Recent Advances in Intrusion Detection
-
-
Bailey, M.1
Andersen, J.2
Morleymao, Z.3
Jahanian, F.4
-
7
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. Hlausckek, C. Kruegel, and E. Kirda, "Scalable, behavior-based malware clustering," in Network and Distributed System Security Symposium, 2009.
-
(2009)
Network and Distributed System Security Symposium
-
-
Bayer, U.1
Comparetti, P.M.2
Hlausckek, C.3
Kruegel, C.4
Kirda, E.5
-
12
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and detecting fast-flux service networks," in Proceedings of the Network and Distributed System Security Symposium, 2008.
-
(2008)
Proceedings of the Network and Distributed System Security Symposium
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
13
-
-
84866996814
-
Social network analysis for cluster-based ip spam reputation
-
Z. Sadan and D. G. Schwartz, "Social network analysis for cluster-based ip spam reputation," in Information Management & Computer Security, Vol. 20, 2012, pp. 281-295.
-
(2012)
Information Management & Computer Security
, vol.20
, pp. 281-295
-
-
Sadan, Z.1
Schwartz, D.G.2
-
14
-
-
80053943682
-
A framework for dns based detection and mitigation of malware infections on a network
-
E. Stalmans, "A framework for dns based detection and mitigation of malware infections on a network," in Information Security South Africa (ISSA), 2011.
-
(2011)
Information Security South Africa (ISSA)
-
-
Stalmans, E.1
-
15
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "Mapreduce: simplified data processing on large clusters," Communications of the ACM, Vol. 51, no. 1, pp. 107-113, 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
17
-
-
84893224312
-
-
https://www.virustotal.com/en/.
-
-
-
-
18
-
-
84893292643
-
On challenges in evaluating malware clustering
-
P. Li, L. Liu, D. Gao, and M. K. Reiter, "On challenges in evaluating malware clustering," in Proceedings of the 13th international conference on Recent advances in intrusion detection, 2011.
-
(2011)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection
-
-
Li, P.1
Liu, L.2
Gao, D.3
Reiter, M.K.4
-
19
-
-
84875222271
-
Scalable fine-grained behavioral clustering of http-based malware
-
R. Perdisci, D. Ariu, and G. Giacinto, "Scalable fine-grained behavioral clustering of http-based malware," in Computer Networks, 2012.
-
(2012)
Computer Networks
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, G.3
-
20
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection," in Proceedings of the 17th USENIX Security Symposium, 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
21
-
-
84861616193
-
Effort: Efficient and effective bot malware detection
-
S. Shin, Z. Xu, and G. Gu, "Effort: Efficient and effective bot malware detection," in INFOCOM, 2012 Proceedings IEEE, 2012, pp. 2846-2850.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 2846-2850
-
-
Shin, S.1
Xu, Z.2
Gu, G.3
|