-
1
-
-
0032786569
-
Improving support vector machine classifiers by modifying kernel functions
-
DOI 10.1016/S0893-6080(99)00032-5, PII S0893608099000325
-
S. Amari, and S. Wu Improving support vector machine classifiers by modifying kernel functions Neural Netw 12 1999 783 789 (Pubitemid 29359218)
-
(1999)
Neural Networks
, vol.12
, Issue.6
, pp. 783-789
-
-
Amari, S.1
Wu, S.2
-
3
-
-
27544465088
-
Anomaly intrusion detection for system call using the soundex algorithm and neural networks
-
Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
-
B.R. Cha, B. Vaidya, and S. Han Anomaly intrusion detection for system call using the Soundex algorithm and Neural networks 10th IEEE symposium on Computer and communications, Cartagena, Murcia, Spain June 2005 427 433 (Pubitemid 41543309)
-
(2005)
Proceedings - IEEE Symposium on Computers and Communications
, pp. 427-433
-
-
Cha, B.1
Vaidya, B.2
Han, S.3
-
4
-
-
33646822481
-
Episode based masquerade detection
-
DOI 10.1007/11593980-19, Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
S.K. Dash, K.S. Reddy, and A.K. Pujari Episode based Masquerade detection Proceedings of 1st International Conference on information systems security, Kolkata, India December 2005 251 262 (Pubitemid 43775412)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3803
, pp. 251-262
-
-
Dash, S.K.1
Reddy, K.S.2
Pujari, A.K.3
-
5
-
-
80051781512
-
Feature representation and selection in malicious code detection methods based on static system calls
-
Y. Ding, X. Yuan, D. Zhou, L. Dong, and Z. An Feature representation and selection in malicious code detection methods based on static system calls Comput Secur 30 2011 514 524
-
(2011)
Comput Secur
, vol.30
, pp. 514-524
-
-
Ding, Y.1
Yuan, X.2
Zhou, D.3
Dong, L.4
An, Z.5
-
6
-
-
84888871015
-
A fast malware detection algorithm based on objective-oriented association mining
-
Y. Ding, X. Yuan, K. Tang, X. Xiao, and Y. Zhang A fast malware detection algorithm based on objective-oriented association mining Comput Secur 39 2013 315 324
-
(2013)
Comput Secur
, vol.39
, pp. 315-324
-
-
Ding, Y.1
Yuan, X.2
Tang, K.3
Xiao, X.4
Zhang, Y.5
-
7
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S.A. Hofmeyr, and T.A. Longstaf A sense of self for unix processes Proceedings of the 1996 IEEE symposium on computer Security and Privacy, Oakland, USA 1996 120 128
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, Oakland, USA
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Longstaf, T.A.3
-
9
-
-
80051792443
-
-
[Available from] [accessed 23.03.10]
-
Hex-Rays SA IDA pro Introduction 2009 [Available from] http://www.hex-rays.com/products.shtml/ [accessed 23.03.10]
-
(2009)
IDA Pro Introduction
-
-
Sa, H.1
-
10
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
S. Igor, B. Felix, U.P. Xabier, and G.B. Pablo Opcode sequences as representation of executables for data-mining-based unknown malware detection Information.Science 231 2013 64 82
-
(2013)
Information.Science
, vol.231
, pp. 64-82
-
-
Igor, S.1
Felix, B.2
Xabier, U.P.3
Pablo, G.B.4
-
16
-
-
80051780701
-
-
netlux.org (accessed 23.03.10)
-
netlux.org. (2009). Malicious code samples available from: http://vx.netlux.org/ (accessed 23.03.10).
-
(2009)
Malicious Code Samples
-
-
-
17
-
-
84902268375
-
-
Offensive Computing (accessed 23.03.10)
-
Offensive Computing. (2005). Malicious code samples available from: http://www.offensivecomputing.net/ (accessed 23.03.10).
-
(2005)
Malicious Code Samples
-
-
-
18
-
-
84888868663
-
-
[Available from] [accessed 23.03.10]
-
Peid Peid v0.94 2007 [Available from] http://www.peid.info/ [accessed 23.03.10]
-
(2007)
Peid v0.94
-
-
-
19
-
-
58849157332
-
Unknown Malcode detection using opcode Representation[C]
-
M. Robert, F. Clint, T. Nir, B. Eugene, G. Marina, and D. Shlomi et al. Unknown Malcode detection using opcode Representation[C] Proceedings of the 1st European Conference on Intelligence and Security Informatics(EuroISI) 2008 204 215
-
(2008)
Proceedings of the 1st European Conference on Intelligence and Security Informatics(EuroISI)
, pp. 204-215
-
-
Robert, M.1
Clint, F.2
Nir, T.3
Eugene, B.4
Marina, G.5
Shlomi, D.6
-
20
-
-
45549117987
-
Term-weighting approaches in automatic text retrieval
-
G. Salton, and C. Buckley Term-weighting approaches in automatic text retrieval Information Process Manag 24 5 1988 513 523
-
(1988)
Information Process Manag
, vol.24
, Issue.5
, pp. 513-523
-
-
Salton, G.1
Buckley, C.2
-
21
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features - A State-Of-The-Art Survey
-
A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer Detection of malicious code by applying machine learning classifiers on static features - a State-of-the-Art Survey Inf Secur Tech Rep 14 1 2009 16 29
-
(2009)
Inf Secur Tech Rep
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
22
-
-
34548147746
-
Process profiling using frequencies of system calls
-
DOI 10.1109/ARES.2007.116, 4159838, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007
-
S.M. Varghese, and K.P. Jacob Process Profiling using frequencies of System Calls The Second International Conference on Availability, Reliability and Security, Vienna Austria April 2007 473 479 (Pubitemid 47304251)
-
(2007)
Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007
, pp. 473-479
-
-
Varghese, S.M.1
Jacob, K.P.2
-
23
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D.Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognit 36 1 2003 229 243
-
(2003)
Pattern Recognit
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
24
-
-
56549097799
-
High-order Markov kernels for intrusion detection
-
C. Yin, S. Tian, and S. Mu High-order Markov kernels for intrusion detection Neurocomputing 71 2008 3247 3252
-
(2008)
Neurocomputing
, vol.71
, pp. 3247-3252
-
-
Yin, C.1
Tian, S.2
Mu, S.3
-
25
-
-
80051782858
-
Unknown malicious codes Detection Based on Rough Set Theory and Support Vector Machine
-
B.Y. Zhang, J.P. Yin, W.S. Tang, and J. Hao Unknown malicious codes Detection Based on Rough Set Theory and Support Vector Machine International Joint Conference on Neural Networks Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 2006 16 21
-
(2006)
International Joint Conference on Neural Networks Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada
, pp. 16-21
-
-
Zhang, B.Y.1
Yin, J.P.2
Tang, W.S.3
Hao, J.4
-
26
-
-
84890752534
-
Malware detection method based on the control-flow construct feature of software
-
Z. Zhao, J. Wang, and J. Bai Malware detection method based on the control-flow construct feature of software Inf Secur IET 8 1 2014 18 24
-
(2014)
Inf Secur IET
, vol.8
, Issue.1
, pp. 18-24
-
-
Zhao, Z.1
Wang, J.2
Bai, J.3
|