-
2
-
-
67349123665
-
Profile hidden Markov models and metamorphic virus detection
-
Attaluri, S., McGhee, S., Stamp, M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151–169 (2009)
-
(2009)
J. Comput. Virol.
, vol.5
, Issue.2
, pp. 151-169
-
-
Attaluri, S.1
McGhee, S.2
Stamp, M.3
-
3
-
-
84875549453
-
Exploring hidden Markov models for virus analysis: a semantic approach
-
Austin, T., Filiol, E., Josse, S., Stamp, M.: Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii International Conference on System Sciences (HICSS 46), pp. 5039–5048 (2013)
-
(2013)
46th Hawaii International Conference on System Sciences (HICSS 46)
, pp. 5039-5048
-
-
Austin, T.1
Filiol, E.2
Josse, S.3
Stamp, M.4
-
4
-
-
84893000796
-
Structural entropy and metamorphic malware
-
Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. Hacking Tech. 9(4), 179–192 (2013)
-
(2013)
J. Comput. Virol. Hacking Tech.
, vol.9
, Issue.4
, pp. 179-192
-
-
Baysa, D.1
Low, R.M.2
Stamp, M.3
-
5
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30, 1145–1159 (1997)
-
(1997)
Pattern Recognit
, vol.30
, pp. 1145-1159
-
-
Bradley, A.P.1
-
6
-
-
84893187027
-
-
Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system
-
Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system. https://www.cs.drexel.edu/~spiros/papers/saso2013.pdf (2013)
-
(2013)
-
-
-
8
-
-
49449098182
-
What is the expectation maximization algorithm?
-
Do, C.B., Batzoglou, S
-
Do, C.B., Batzoglou, S.: What is the expectation maximization algorithm? Nat. Biotechnol. 26(8), 897–899. http://ai.stanford.edu/~chuongdo/papers/em_tutorial.pdf (2008)
-
Nat. Biotechnol.
, vol.26
, Issue.8
, pp. 897-899
-
-
-
9
-
-
84941238015
-
-
Indika: Difference between hierarchical and partitional clustering
-
Indika: Difference between hierarchical and partitional clustering. http://www.differencebetween.com/difference-between-hierarchical-and-vs-partitional-clustering (2011)
-
(2011)
-
-
-
11
-
-
84941238016
-
-
Jin, R.: Cluster validation
-
Jin, R.: Cluster validation. http://www.cs.kent.edu/~jin/DM08/ClusterValidation.pdf (2008)
-
(2008)
-
-
-
12
-
-
84953744816
-
A statistical interpretation of term specificity and its application in retrieval
-
Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Doc. 28(1), 11–21 (1972)
-
(1972)
J. Doc.
, vol.28
, Issue.1
, pp. 11-21
-
-
Jones, K.1
-
13
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter, S., Maloof, M.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2721-2744
-
-
Kolter, S.1
Maloof, M.2
-
15
-
-
0028181441
-
Hidden Markov models in computational biology: applications to protein modeling
-
Krogh, A., et al.: Hidden Markov models in computational biology: applications to protein modeling. J. Mol. Biol. 235(5), 1501–1531 (1994)
-
(1994)
J. Mol. Biol.
, vol.235
, Issue.5
, pp. 1501-1531
-
-
Krogh, A.1
-
16
-
-
84880635362
-
VILO: a rapid learning nearest-neighbor classifier for malware triage
-
Lakhotia, A., Walenstein, A., Miles, C., Singh, A.: VILO: a rapid learning nearest-neighbor classifier for malware triage. J. Comput. Virol. 9(3), 109–123 (2013)
-
(2013)
J. Comput. Virol.
, vol.9
, Issue.3
, pp. 109-123
-
-
Lakhotia, A.1
Walenstein, A.2
Miles, C.3
Singh, A.4
-
19
-
-
84874567401
-
A similarity metric method of obfuscated malware using function-call graph
-
Ming, X., et al.: A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1), 35–47 (2013)
-
(2013)
J. Comput. Virol. Hacking Tech.
, vol.9
, Issue.1
, pp. 35-47
-
-
Ming, X.1
-
20
-
-
84941238017
-
-
MITRE: Malware attribute enumeration and characterization
-
MITRE: Malware attribute enumeration and characterization. http://maec.mitre.org (2013)
-
(2013)
-
-
-
21
-
-
84941238018
-
-
Moore, A.W.: (Formula presented.)-Means and hierarchical clustering
-
Moore, A.W.: $$K$$K-Means and hierarchical clustering. http://www.autonlab.org/tutorials/kmeans11.pdf (2001)
-
(2001)
-
-
-
23
-
-
84888873413
-
Deriving common malware behavior through graph clustering
-
Park, Y., Reeves, D.S., Stamp, M.: Deriving common malware behavior through graph clustering. Comput. Secur. 39(B), 419–430 (2013)
-
(2013)
Comput. Secur.
, vol.39
, Issue.B
, pp. 419-430
-
-
Park, Y.1
Reeves, D.S.2
Stamp, M.3
-
24
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
25
-
-
84860621757
-
Opcode graph similarity and metamorphic detection
-
Runwal, N., Low, R., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8, 37–52 (2012)
-
(2012)
J. Comput. Virol.
, vol.8
, pp. 37-52
-
-
Runwal, N.1
Low, R.2
Stamp, M.3
-
26
-
-
82055176044
-
Eigenviruses for metamorphic virus recognition
-
Saleh, M., Mohamed, A., Nabi, A.: Eigenviruses for metamorphic virus recognition. IET Inf. Secur. 5(4), 191–198 (2011)
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.4
, pp. 191-198
-
-
Saleh, M.1
Mohamed, A.2
Nabi, A.3
-
27
-
-
84941238019
-
-
Skulason, F., Solomon, A., Bontchev, V.: CARO naming scheme
-
Skulason, F., Solomon, A., Bontchev, V.: CARO naming scheme. http://www.caro.org/naming/scheme.html (1991)
-
(1991)
-
-
-
28
-
-
80255131297
-
Comparing files using structural entropy
-
Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.4
, pp. 259-265
-
-
Sorokin, I.1
-
29
-
-
84876448803
-
Metamorphic worm that carries its own morphing engine
-
Sridhara, S.M., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. Hacking Tech. 9(2), 49–58 (2013)
-
(2013)
J. Comput. Virol. Hacking Tech.
, vol.9
, Issue.2
, pp. 49-58
-
-
Sridhara, S.M.1
Stamp, M.2
-
30
-
-
84941238020
-
-
Stamp, M.: A revealing introduction to hidden Markov models
-
Stamp, M.: A revealing introduction to hidden Markov models. http://www.cs.sjsu.edu/faculty/stamp/RUA/HMM.pdf (2012)
-
(2012)
-
-
-
31
-
-
84941238021
-
-
Swimmer, M.: Response to the proposal for a “C virus” database. ACM SIGSAC Review, vol. 8, pp. 1–5
-
Swimmer, M.: Response to the proposal for a “C virus” database. ACM SIGSAC Review, vol. 8, pp. 1–5. http://www.odysci.com/article/1010112993890087 (1990)
-
(1990)
-
-
-
32
-
-
84941238022
-
-
Symantec: Trojan.Zbot
-
Symantec: Trojan.Zbot. http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99 (2010)
-
(2010)
-
-
-
33
-
-
84941238023
-
-
Symantec Security Response: Trojan.Zeroaccess
-
Symantec Security Response: Trojan.Zeroaccess. http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99 (2011)
-
(2011)
-
-
-
34
-
-
84941238024
-
-
Virus Removal Services: Beware of FAKE antivirus—Winwebsec
-
Virus Removal Services: Beware of FAKE antivirus—Winwebsec. http://virus.myfirstattempt.com/2012/11/beware-of-fake-anti-virus-winwebsec.html (2012)
-
(2012)
-
-
-
35
-
-
84941238025
-
-
VX Heavens
-
VX Heavens. http://vx.netlux.org/ (2013)
-
(2013)
-
-
-
36
-
-
33751208937
-
Hunting for metamorphic engines
-
Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.3
, pp. 211-229
-
-
Wong, W.1
Stamp, M.2
|