-
1
-
-
84856174348
-
-
[Accessed on 2012].
-
F-secure. F-secure reports amount of malware grew by 100% during 2007. 2007. Available from: http://www.businesswire.com/news/home/20071204005453/en/F-Secure-Report s-Amount-Malware-Grew-100-2007#.VEDYtYuUfA4 [Accessed on 2012].
-
(2007)
F-secure reports amount of malware grew by 100% during 2007
-
-
-
2
-
-
84973569559
-
-
[Accessed on 2012].
-
Kaspersky, Q1/2011 malware report. 2011. Available from: http://www.kaspersky.com/downloads/pdf/kaspersky_lab_q1_malware_2011_report.pdf [Accessed on 2012].
-
(2011)
-
-
-
3
-
-
84897768316
-
-
[Accessed on 2012].
-
Symantec. Internet security threat report. 2011. Available from: https://www4.symantec.com/mktginfo/downloads/21182883_GA_REPORT_ISTR_Main-Report_04-11_HI-RES.pdf [Accessed on 2012].
-
(2011)
Internet security threat report
-
-
-
4
-
-
56549084673
-
-
Department of Computer Science, Purdue University, [Accessed on 2013].
-
Idika N, Mathur AP. A survey of malware detection techniques. Department of Computer Science, Purdue University, 2007. Available from: http://cyberunited.com/wp-content/uploads/2013/03/A-Survey-of-Malware-Detection-Techniques.pdf [Accessed on 2013].
-
(2007)
A survey of malware detection techniques
-
-
Idika, N.1
Mathur, A.P.2
-
5
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
Egele M, Scholte T, Kirda E, Kruegel C. A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys 2008; 44(2):6:1-6:42.
-
(2008)
ACM Computing Surveys
, vol.44
, Issue.2
, pp. 1-42
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
6
-
-
48649087530
-
Limits of static analysis for malware detection. Computer Security Applications Conference, 2007
-
Miami Beach, FL, December
-
Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection. Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, Miami Beach, FL, December 2007; 421-430.
-
(2007)
ACSAC 2007. Twenty-Third Annual
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
7
-
-
77954707625
-
Malware detection based on mining api calls
-
ACM, New York, NY, USA
-
Sami A, Yadegari B, Rahimi H, Peiravian N, Hashemi S, Hamze A. Malware detection based on mining api calls. Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, ACM, New York, NY, USA, 2010; 1020-1025.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10
, pp. 1020-1025
-
-
Sami, A.1
Yadegari, B.2
Rahimi, H.3
Peiravian, N.4
Hashemi, S.5
Hamze, A.6
-
8
-
-
54849412646
-
An intelligent pe-malware detection system based on association mining
-
Ye Y, Wang D, Li T, Ye D, Jiang Q. An intelligent pe-malware detection system based on association mining. Journal in Computer Virology 2008; 4(4):323-334.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
-
9
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
CA, USA, [Accessed on 2011].
-
Christodorescu M, Jha S. Static analysis of executables to detect malicious patterns. Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03, USENIX Association, Berkeley, CA, USA, 2003; 12-12. Available from: http://dl.acm.org/citation.cfm?id=1251353.1251365 [Accessed on 2011].
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03, USENIX Association, Berkeley
, pp. 12-12
-
-
Christodorescu, M.1
Jha, S.2
-
10
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
[Accessed on 2014].
-
Rieck K, Trinius P, Willems C, Holz T. Automatic analysis of malware behavior using machine learning. Journal of Computer Security 2011; 19(4):639-668. Available from: http://dl.acm.org/citation.cfm?id=2011216. 2011217 [Accessed on 2014].
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
, pp. 639-668
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
11
-
-
84882639451
-
Malware detection by behavioural sequential patterns
-
[Accessed on 2014].
-
Ahmadi M, Sami A, Rahimi H, Yadegari B. Malware detection by behavioural sequential patterns. Computer Fraud & Security 2013; 2013(8):11-19. Available from: http://www.sciencedirect.com/science/article/pii/S1361372313700721 [Accessed on 2014].
-
(2013)
Computer Fraud & Security
, vol.2013
, Issue.8
, pp. 11-19
-
-
Ahmadi, M.1
Sami, A.2
Rahimi, H.3
Yadegari, B.4
-
12
-
-
77956221197
-
Automatic malware categorization using cluster ensemble
-
KDD '10, ACM, New York, NY, USA
-
Ye Y, Li T, Chen Y, Jiang Q. Automatic malware categorization using cluster ensemble. Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '10, ACM, New York, NY, USA, 2010; 95-104.
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 95-104
-
-
Ye, Y.1
Li, T.2
Chen, Y.3
Jiang, Q.4
-
13
-
-
0038349200
-
Mops: an infrastructure for examining security properties of software
-
ACM, New York, NY, USA
-
Chen H, Wagner D. Mops: an infrastructure for examining security properties of software. Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, ACM, New York, NY, USA, 2002; 235-244.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02
, pp. 235-244
-
-
Chen, H.1
Wagner, D.2
-
14
-
-
25644452721
-
Model checking one million lines of c code
-
San Diego, California
-
Chen H, Dean D, Wagner D. Model checking one million lines of c code. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, 2004; 171-185.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 171-185
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
15
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Oakland, California, May
-
Feng H, Giffin J, Huang Y, Jha S, Lee W, Miller B. Formalizing sensitivity in static analysis for intrusion detection. Proceedings. 2004 IEEE Symposium on Security and Privacy, 2004, Oakland, California, May 2004; 194-208.
-
(2004)
Proceedings. 2004 IEEE Symposium on Security and Privacy, 2004
, pp. 194-208
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
16
-
-
76649141154
-
Automatic generation of string signatures for malware detection
-
RAID '09, Springer-Verlag, Berlin, Heidelberg
-
Griffin K, Schneider S, Hu X, Chiueh TC. Automatic generation of string signatures for malware detection. Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09, Springer-Verlag, Berlin, Heidelberg, 2009; 101-120.
-
(2009)
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 101-120
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Chiueh, T.C.4
-
17
-
-
84964812271
-
-
[Accessed on 2014].
-
Ida : Disassembler and debugger. 2013. Available from: https://www.hex-rays.com/products/ida/ [Accessed on 2014].
-
(2013)
Ida : Disassembler and debugger
-
-
-
18
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
[Accessed on 2014], Data Mining for Information Security.
-
Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences 2013; 231(0):64-82.Available from: http://www.sciencedirect.com/science/article/pii/S0020025511004336 [Accessed on 2014], Data Mining for Information Security.
-
(2013)
Information Sciences
, vol.231
, pp. 64-82
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
19
-
-
70449633109
-
Malware detection using statistical analysis of byte-level file content
-
CSI-KDD '09, ACM, New York, NY, USA
-
Tabish SM, Shafiq MZ, Farooq M. Malware detection using statistical analysis of byte-level file content. Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics, CSI-KDD '09, ACM, New York, NY, USA, 2009; 23-31.
-
(2009)
Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics
, pp. 23-31
-
-
Tabish, S.M.1
Shafiq, M.Z.2
Farooq, M.3
-
20
-
-
84899704421
-
Novel active learning methods for enhanced (PC) malware detection in windows (OS)
-
[Accessed on 2014].
-
Novel active learning methods for enhanced (PC) malware detection in windows (OS). Expert Systems with Applications 2014; 41(13):5843-5857. Available from: http://www.sciencedirect.com/science/article/pii/S095741741400133X [Accessed on 2014].
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.13
, pp. 5843-5857
-
-
-
21
-
-
21644475665
-
Static analyzer of vicious executables (save)
-
IEEE Computer Society, Washington, DC, USA
-
Sung AH, Xu J, Chavez P, Mukkamala S. Static analyzer of vicious executables (save). Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04, IEEE Computer Society, Washington, DC, USA, 2004; 326-334.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04
, pp. 326-334
-
-
Sung, A.H.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
22
-
-
84973519652
-
A generic virus scanner for c++. Computer Security Applications Conference, 1992
-
San Antonio, TX, November
-
Kumar S, Spafford E. A generic virus scanner for c++. Computer Security Applications Conference, 1992. Proceedings., Eighth Annual, San Antonio, TX, November 1992; 210-219.
-
(1992)
Proceedings., Eighth Annual
, pp. 210-219
-
-
Kumar, S.1
Spafford, E.2
-
23
-
-
76649143365
-
Pe-miner: mining structural information to detect malicious executables in realtime
-
Kirda E, Jha S, Balzarotti D (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg
-
Shafiq M, Tabish S, Mirza F, Farooq M. Pe-miner: mining structural information to detect malicious executables in realtime. In Recent Advances in Intrusion Detection, vol.5758, Kirda E, Jha S, Balzarotti D (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg, 2009; 121-141.
-
(2009)
Recent Advances in Intrusion Detection
, vol.5758
, pp. 121-141
-
-
Shafiq, M.1
Tabish, S.2
Mirza, F.3
Farooq, M.4
-
24
-
-
52049124286
-
A virus prevention model based on static analysis and data mining methods
-
CIT Workshops 2008, Sydney, QLD, July
-
Wang TY, Wu CH, Hsieh CC. A virus prevention model based on static analysis and data mining methods. IEEE 8th International Conference on Computer and Information Technology Workshops, 2008. CIT Workshops 2008, Sydney, QLD, July 2008; 288-293.
-
(2008)
IEEE 8th International Conference on Computer and Information Technology Workshops, 2008
, pp. 288-293
-
-
Wang, T.Y.1
Wu, C.H.2
Hsieh, C.C.3
-
25
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
Willems C, Holz T, Freiling F. Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy 2007; 5(2):32-39.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
26
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer-Verlag, Berlin, Heidelberg
-
Rieck K, Holz T, Willems C, Dussel P, Laskov P. Learning and classification of malware behavior. Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, Springer-Verlag, Berlin, Heidelberg, 2008; 108-125.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
27
-
-
77952602657
-
Efficient virus detection using dynamic instruction sequences
-
[Accessed on 2011].
-
Dai J, Guha R, Lee J. Efficient virus detection using dynamic instruction sequences. Journal of Computers 2009; 4(5). Available from: http://ojs.academypublisher.com/index.php/jcp/article/view/0405405414 [Accessed on 2011].
-
(2009)
Journal of Computers
, vol.4
, Issue.5
-
-
Dai, J.1
Guha, R.2
Lee, J.3
-
28
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
Berkeley, CA, USA. Available from:[Accessed on 2012]
-
Kolbitsch C, Comparetti PM, Kruegel C, Kirda E, Zhou X, Wang X. Effective and efficient malware detection at the end host. Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, USENIX Association, Berkeley, CA, USA. Available from: http://dl.acm.org/citation.cfm?id=1855768.1855790 [Accessed on 2012], 2009; 351-366.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, USENIX Association
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
29
-
-
77955854581
-
Malware detection based on dependency graph using hybrid genetic algorithm
-
GECCO '10, ACM, New York, NY, USA
-
Kim K, Moon BR. Malware detection based on dependency graph using hybrid genetic algorithm. Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, GECCO '10, ACM, New York, NY, USA, 2010; 1211-1218.
-
(2010)
Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation
, pp. 1211-1218
-
-
Kim, K.1
Moon, B.R.2
-
30
-
-
78650024495
-
Accessminer: using system-centric models for malware protection
-
New York, NY, USA
-
Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E. Accessminer: using system-centric models for malware protection. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, ACM, New York, NY, USA, 2010; 399-412.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, ACM
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
31
-
-
84881183138
-
Driving in the cloud: an analysis of drive-by download operations and abuse reporting
-
Rieck K, Stewin P, Seifert JP (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg
-
Nappa A, Rafique M, Caballero J. Driving in the cloud: an analysis of drive-by download operations and abuse reporting. In Detection of Intrusions and Malware, and Vulnerability Assessment, vol.7967, Rieck K, Stewin P, Seifert JP (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg, 1-20, 2013).
-
(2013)
Detection of Intrusions and Malware, and Vulnerability Assessment
, vol.7967
, pp. 1-20
-
-
Nappa, A.1
Rafique, M.2
Caballero, J.3
-
32
-
-
34547335088
-
Frequent pattern mining: current status and future directions
-
Han J, Cheng H, Xin D, Yan X. Frequent pattern mining: current status and future directions. Data Mining and Knowledge Discovery 2007; 15(1):55-86.
-
(2007)
Data Mining and Knowledge Discovery
, vol.15
, Issue.1
, pp. 55-86
-
-
Han, J.1
Cheng, H.2
Xin, D.3
Yan, X.4
-
33
-
-
79952266600
-
Detection of malicious applications on android os
-
[Accessed on 2014].
-
DiCerbo F, Girardello A, Michahelles F, Voronkova S. Detection of malicious applications on android os. Proceedings of the 4th International Conference on Computational Forensics, IWCF'10, Springer-Verlag, Berlin, Heidelberg, 2011; 138-149. Available from: http://dl.acm.org/citation.cfm?id=1991416.1991433 [Accessed on 2014].
-
(2011)
Proceedings of the 4th International Conference on Computational Forensics, IWCF'10, Springer-Verlag, Berlin, Heidelberg
, pp. 138-149
-
-
DiCerbo, F.1
Girardello, A.2
Michahelles, F.3
Voronkova, S.4
-
34
-
-
84906493196
-
Droidminer: automated mining and characterization of fine-grained malicious behaviors in android applications
-
Wroclaw, Poland, 7-11 September ; -.
-
Yang C, Xu Z, Gu G, Yegneswaran V, Porras P. Droidminer: automated mining and characterization of fine-grained malicious behaviors in android applications. 19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7-11 September 2014; 163-182.
-
(2014)
19th European Symposium on Research in Computer Security
, pp. 163-182
-
-
Yang, C.1
Xu, Z.2
Gu, G.3
Yegneswaran, V.4
Porras, P.5
-
35
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
Washington, DC, USA
-
Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X. Synthesizing near-optimal malware specifications from suspicious behaviors. Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10m, IEEE Computer Society, Washington, DC, USA, 2010; 45-60.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10m, IEEE Computer Society
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
37
-
-
84875216992
-
Scalable fine-grained behavioral clustering of http-based malware
-
[Accessed on 2014], Botnet Activity: Analysis, Detection and Shutdown.
-
Perdisci R, Ariu D, Giacinto G. Scalable fine-grained behavioral clustering of http-based malware. Computer Networks 2013; 57(2):487-500.Available from: http://www.sciencedirect.com/science/article/pii/S1389128612002678 [Accessed on 2014], Botnet Activity: Analysis, Detection and Shutdown.
-
(2013)
Computer Networks
, vol.57
, Issue.2
, pp. 487-500
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, G.3
-
38
-
-
84893321191
-
Extraction of statistically significant malware behaviors
-
ACM, New York, NY, USA
-
Palahan S, Babić D, Chaudhuri S, Kifer D. Extraction of statistically significant malware behaviors. Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, ACM, New York, NY, USA, 2013; 69-78.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13
, pp. 69-78
-
-
Palahan, S.1
Babić, D.2
Chaudhuri, S.3
Kifer, D.4
-
39
-
-
84856751352
-
Elf-miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables
-
Shahzad F, Farooq M. Elf-miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables. Knowledge and Information Systems March 2012; 30(3):589-612.
-
(2012)
Knowledge and Information Systems
, vol.30
, Issue.3
, pp. 589-612
-
-
Shahzad, F.1
Farooq, M.2
-
40
-
-
84973578931
-
-
[Accessed on 2013]
-
Dependency walker : disassembler and debugger, 2013. Available from: http://www.dependencywalker.com/ [Accessed on 2013].
-
(2013)
-
-
-
41
-
-
7444242202
-
Cmtreeminer: mining both closed and maximal frequent subtrees
-
In, Dai H, Srikant R, Zhang C (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg
-
Chi Y, Yang Y, Xia Y, Muntz R, Cmtreeminer: mining both closed and maximal frequent subtrees. In Advances in Knowledge Discovery and data Mining, vol.3056, Dai H, Srikant R, Zhang C (eds), Lecture Notes in Computer Science, Springer: Berlin Heidelberg, 2004; 63-73.
-
(2004)
Advances in Knowledge Discovery and data Mining
, vol.3056
, pp. 63-73
-
-
Chi, Y.1
Yang, Y.2
Xia, Y.3
Muntz, R.4
-
42
-
-
24344486868
-
Efficiently mining frequent trees in a forest: algorithms and applications
-
special issue on Mining Biological Data
-
Zaki MJ. Efficiently mining frequent trees in a forest: algorithms and applications. IEEE Transactions on Knowledge and Data Engineering 2005; 17(8):1021-1035. special issue on Mining Biological Data.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.8
, pp. 1021-1035
-
-
Zaki, M.J.1
-
43
-
-
4544334171
-
-
Asai T, Abe K, Kawasoe S, Sakamoto H, Arikawa S. Efficient substructure discovery from large semi-structured data. 2002; 158-174.
-
(2002)
Efficient substructure discovery from large semi-structured data
, pp. 158-174
-
-
Asai, T.1
Abe, K.2
Kawasoe, S.3
Sakamoto, H.4
Arikawa, S.5
-
44
-
-
84973520666
-
-
[Accessed on 2013].
-
Weka : data mining software in java, 2013. Available from: http://www.cs.waikato.ac.nz/ml/weka/ [Accessed on 2013].
-
(2013)
-
-
-
45
-
-
78650139747
-
Comprehensive evaluation of association measures for fault localization
-
Washington, DC, USA
-
Lucia L, Lo D, Jiang L, Budi A. Comprehensive evaluation of association measures for fault localization. Proceedings of the 2010 IEEE International Conference on Software Maintenance, ICSM '10, IEEE Computer Society, Washington, DC, USA, 2010; 1-10.
-
(2010)
Proceedings of the 2010 IEEE International Conference on Software Maintenance, ICSM '10, IEEE Computer Society
, pp. 1-10
-
-
Lucia, L.1
Lo, D.2
Jiang, L.3
Budi, A.4
-
46
-
-
84875656430
-
A.:Exploiting similarity between variants to defeat malware: vilo? method for comparingand searching binary programs
-
[Accessed on 2014].
-
Walenstein A, Venable M, Hayes M, Thompson C, Lakhotia A. A.:Exploiting similarity between variants to defeat malware: vilo? method for comparingand searching binary programs. In: Proceedings of BlackHat DC 2007, Las Vegas, 2007. Available from: https://blackhat.com/presentations/bh-dc-07/Walenstein/paper/bh-dc-07-walenstein-WP.pdf [Accessed on 2014].
-
(2007)
Proceedings of BlackHat DC 2007, Las Vegas
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
47
-
-
84856189723
-
Malware variant detection using similarity search over sets of control flow graphs
-
Changsha, China, November
-
Cesare S, Xiang Y. Malware variant detection using similarity search over sets of control flow graphs. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM), Changsha, China, November 2011; 181-189.
-
(2011)
2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM)
, pp. 181-189
-
-
Cesare, S.1
Xiang, Y.2
-
48
-
-
84973577407
-
-
[Accessed on 2013].
-
Wikipedia. Longest common subsequence problem, 2013. Available from: http://en.wikipedia.org/wiki/Longest_common_subsequence:problem [Accessed on 2013].
-
(2013)
Longest common subsequence problem
-
-
|