-
1
-
-
84924656413
-
Revolver: An automated approach to the detection of evasive Web-based malware
-
A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, G. Vigna, "Revolver: An automated approach to the detection of evasive Web-based malware," in Proc. 22nd USENIX Conf. Secur. (SEC), 2013, pp. 637-652.
-
(2013)
Proc. 22nd USENIX Conf. Secur. (SEC)
, pp. 637-652
-
-
Kapravelos, A.1
Shoshitaishvili, Y.2
Cova, M.3
Kruegel, C.4
Vigna, G.5
-
2
-
-
84960873897
-
-
AV-Test. (Nov. 2014). [Online] Available
-
AV-Test. (Nov. 2014). AV-Test Malware Statistics. [Online]. Available: http://www.av-test.org/en/statistics/malware/
-
AV-Test Malware Statistic
-
-
-
3
-
-
84871698137
-
What you see predicts what you get-Lightweight agent-based malware detection
-
W. Wang, I. Murynets, J. Bickford, C. Van Wart, G. Xu, "What you see predicts what you get-Lightweight agent-based malware detection," Secur. Commun. Netw., vol. 6, no. 1, pp. 33-48, 2013.
-
(2013)
Secur. Commun. Netw
, vol.6
, Issue.1
, pp. 33-48
-
-
Wang, W.1
Murynets, I.2
Bickford, J.3
Van Wart, C.4
Xu, G.5
-
4
-
-
0037269111
-
Reliable identification of bounded-length viruses is NP-complete
-
Jan.
-
D. Spinellis, "Reliable identification of bounded-length viruses is NP-complete," IEEE Trans. Inf. Theory, vol. 49, no. 1, pp. 280-284, Jan. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
6
-
-
84893366993
-
Growing grapes in your computer to defend against malware
-
Feb.
-
Z. Shan and X. Wang, "Growing grapes in your computer to defend against malware," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 196-207, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 196-207
-
-
Shan, Z.1
Wang, X.2
-
7
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, R. E. Bryant, "Semantics-aware malware detection," in Proc. IEEE Symp. Secur. Privacy (SP), May 2005, pp. 32-46.
-
(2005)
Proc IEEE Symp. Secur. Privacy (SP)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
8
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
May
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, X. Yan, "Synthesizing near-optimal malware specifications from suspicious behaviors," in Proc. 8th IEEE Symp. Secur. Privacy (SP), May 2010, pp. 45-60.
-
(2010)
Proc. 8th IEEE Symp. Secur. Privacy (SP)
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
9
-
-
84888316706
-
JACKSTRAWS: Picking command and control connections from bot traffic
-
G. Jacob, R. Hund, C. Kruegel, T. Holz, "JACKSTRAWS: Picking command and control connections from bot traffic," in Proc. 20th USENIX Conf. Secur. (SEC), 2011, pp. 29-48.
-
(2011)
Proc. 20th USENIX Conf. Secur. (SEC)
, pp. 29-48
-
-
Jacob, G.1
Hund, R.2
Kruegel, C.3
Holz, T.4
-
10
-
-
84880591959
-
ENDMal: An antiobfuscation and collaborative malware detection system using syscall sequences
-
H. Lu, X. Wang, B. Zhao, F. Wang, J. Su, "ENDMal: An antiobfuscation and collaborative malware detection system using syscall sequences," Math. Comput. Model., vol. 58, nos. 5-6, pp. 1140-1154, 2013.
-
(2013)
Math. Comput. Model
, vol.58
, Issue.5-6
, pp. 1140-1154
-
-
Lu, H.1
Wang, X.2
Zhao, B.3
Wang, F.4
Su, J.5
-
11
-
-
84888873413
-
Deriving common malware behavior through graph clustering
-
Nov.
-
Y. Park, D. S. Reeves, M. Stamp, "Deriving common malware behavior through graph clustering," Comput. Secur., vol. 39, pp. 419-430, Nov. 2013.
-
(2013)
Comput. Secur
, vol.39
, pp. 419-430
-
-
Park, Y.1
Reeves, D.S.2
Stamp, M.3
-
12
-
-
33745201000
-
Anomalous system call detection
-
Feb.
-
D. Mutz, F. Valeur, G. Vigna, C. Kruegel, "Anomalous system call detection," ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 61-93, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
13
-
-
84860630143
-
Shadow attacks: Automatically evading system-call-behavior based malware detection
-
W. Ma, P. Duan, S. Liu, G. Gu, J.-C. Liu, "Shadow attacks: Automatically evading system-call-behavior based malware detection," J. Comput. Virol., vol. 8, nos. 1-2, pp. 1-13, 2012.
-
(2012)
J. Comput. Virol
, vol.8
, Issue.1-2
, pp. 1-13
-
-
Ma, W.1
Duan, P.2
Liu, S.3
Gu, G.4
Liu, J.-C.5
-
14
-
-
84904089566
-
Bee Master: Detecting host-based code injection attacks
-
T. Barabosch, S. Eschweiler, E. Gerhards-Padilla, "Bee master: Detecting host-based code injection attacks," in Proc. 11th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment (DIMVA), vol. 8550. 2014, pp. 235-254.
-
(2014)
Proc. 11th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment (DIMVA)
, vol.8550
, pp. 235-254
-
-
Barabosch, T.1
Eschweiler, S.2
Gerhards-Padilla, E.3
-
15
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. S. Kc, A. D. Keromytis, V. Prevelakis, "Countering code-injection attacks with instruction-set randomization," in Proc. 10th ACM Conf. Comput. Commun. Secur. (CCS), 2003, pp. 272-280.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
16
-
-
84901647630
-
A mulitiprocess mechanism of evading behavior-based bot detection approaches
-
Springer-Verlag
-
Y. Ji, Y. He, D. Zhu, Q. Li, D. Guo, "A mulitiprocess mechanism of evading behavior-based bot detection approaches," in Information Security Practice and Experience (Lecture Notes in Computer Science), vol. 8434. Springer-Verlag, 2014, pp. 75-89.
-
(2014)
Information Security Practice and Experience (Lecture Notes in Computer Science)
, vol.8434
, pp. 75-89
-
-
Ji, Y.1
He, Y.2
Zhu, D.3
Li, Q.4
Guo, D.5
-
17
-
-
84855853978
-
Multiprocess malware
-
Oct
-
M. Ramilli, M. Bishop, S. Sun, "Multiprocess malware," in Proc. 6th Int. Conf. Malicious Unwanted Softw. (MALWARE), Oct. 2011, pp. 8-13.
-
(2011)
Proc. 6th Int. Conf. Malicious Unwanted Softw. (MALWARE)
, pp. 8-13
-
-
Ramilli, M.1
Bishop, M.2
Sun, S.3
-
18
-
-
84889281816
-
-
(Wiley Series in Telecommunications and Signal Processing), 2nd ed New York, NY, USA: Wiley Jul.
-
T. M. Cover and J. A. Thomas, Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing), 2nd ed. New York, NY, USA: Wiley, Jul. 2006.
-
(2006)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
19
-
-
80052815523
-
Typical paths of a graph
-
Jan.
-
C. Cui, Z. Dang, T. R. Fischer, "Typical paths of a graph," Fundam. Inf., vol. 110, nos. 1-4, pp. 95-109, Jan. 2011.
-
(2011)
Fundam. Inf
, vol.110
, Issue.1-4
, pp. 95-109
-
-
Cui, C.1
Dang, Z.2
Fischer, T.R.3
-
20
-
-
84874684616
-
Classification of malware based on integrated static and dynamic features
-
R. Islam, R. Tian, L. M. Batten, S. Versteeg, "Classification of malware based on integrated static and dynamic features," J. Netw. Comput. Appl., vol. 36, no. 2, pp. 646-656, 2013.
-
(2013)
J. Netw. Comput. Appl
, vol.36
, Issue.2
, pp. 646-656
-
-
Islam, R.1
Tian, R.2
Batten, L.M.3
Versteeg, S.4
-
21
-
-
84906826065
-
Behavioral classification and detection of malware through HTTP user agent anomalies
-
N. Kheir, "Behavioral classification and detection of malware through HTTP user agent anomalies," J. Inf. Secur. Appl., vol. 18, no. 1, pp. 2-13, 2013.
-
(2013)
J. Inf. Secur. Appl
, vol.18
, Issue.1
, pp. 2-13
-
-
Kheir, N.1
-
22
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
R. Moskovitch, Y. Elovici, L. Rokach, "Detection of unknown computer worms based on behavioral classification of the host," Comput. Statist. Data Anal., vol. 52, no. 9, pp. 4544-4566, 2008.
-
(2008)
Comput. Statist. Data Anal
, vol.52
, Issue.9
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
23
-
-
84872113696
-
Efficient detection of split personalities in malware
-
D. Balzarotti, M. Cova, C. Karlberger, E. Kirda, C. Kruegel, G. Vigna, "Efficient detection of split personalities in malware," in Proc. Int. Conf. Netw. Distrib. Syst. Secur. Symp. (NDSS), 2010, pp. 1-16.
-
(2010)
Proc. Int. Conf. Netw. Distrib. Syst. Secur. Symp. (NDSS)
, pp. 1-16
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
24
-
-
84857329765
-
Detecting environment-sensitive malware
-
M. Lindorfer, C. Kolbitsch, P. M. Comparetti, "Detecting environment-sensitive malware," in Proc. 14th Int. Conf. Recent Adv. Intrusion Detection (RAID), vol. 6961. 2011, pp. 338-357.
-
(2011)
Proc. 14th Int. Conf. Recent Adv. Intrusion Detection (RAID)
, vol.6961
, pp. 338-357
-
-
Lindorfer, M.1
Kolbitsch, C.2
Comparetti, P.M.3
-
25
-
-
84926676991
-
Environment-reactive malware behavior: Detection and categorization
-
New York, NY, USA: Springer-Verlag
-
S. Naval, V. Laxmi, M. S. Gaur, S. Raja, M. Rajarajan, M. Conti, "Environment-reactive malware behavior: Detection and categorization," in Data Privacy Management, Autonomous Spontaneous Security, Security Assurance. New York, NY, USA: Springer-Verlag, 2015, pp. 167-182.
-
(2015)
Data Privacy Management, Autonomous Spontaneous Security, Security Assurance
, pp. 167-182
-
-
Naval, S.1
Laxmi, V.2
Gaur, M.S.3
Raja, S.4
Rajarajan, M.5
Conti, M.6
-
26
-
-
84906501609
-
Detecting targeted smartphone malware with behavior-triggering stochastic models
-
G. Suarez-Tangil, M. Conti, J. E. Tapiador, P. Peris-Lopez, "Detecting targeted smartphone malware with behavior-triggering stochastic models," in Proc. 19th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 8712. 2014, pp. 183-201.
-
(2014)
Proc. 19th Eur. Symp. Res. Comput. Secur. (ESORICS)
, vol.8712
, pp. 183-201
-
-
Suarez-Tangil, G.1
Conti, M.2
Tapiador, J.E.3
Peris-Lopez, P.4
-
28
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, W. Lee, "Ether: Malware analysis via hardware virtualization extensions," in Proc. 15th ACM Conf. Comput. Commun. Secur. (CCS), 2008, pp. 51-62.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
30
-
-
80255137449
-
Graph-based malware detection using dynamic analysis
-
B. Anderson, D. Quist, J. Neil, C. Storlie, T. Lane, "Graph-based malware detection using dynamic analysis," J. Comput. Virol., vol. 7, no. 4, pp. 247-258, 2011.
-
(2011)
J. Comput. Virol
, vol.7
, Issue.4
, pp. 247-258
-
-
Anderson, B.1
Quist, D.2
Neil, J.3
Storlie, C.4
Lane, T.5
-
31
-
-
84863215860
-
Recognizing malicious software behaviors with tree automata inference
-
Aug.
-
D. Babíc, D. Reynaud, D. Song, "Recognizing malicious software behaviors with tree automata inference," Formal Methods Syst. Design, vol. 41, no. 1, pp. 107-128, Aug. 2012.
-
(2012)
Formal Methods Syst. Design
, vol.41
, Issue.1
, pp. 107-128
-
-
Babíc, D.1
Reynaud, D.2
Song, D.3
-
33
-
-
0003781238
-
-
Cambridge U.K.: Cambridge Univ Press
-
J. R. Norris, Markov Chains. Cambridge, U.K.: Cambridge Univ. Press, 1998.
-
(1998)
Markov Chains
-
-
Norris, J.R.1
-
34
-
-
0021487630
-
Parallel graph algorithms
-
Sep.
-
M. J. Quinn and N. Deo, "Parallel graph algorithms," ACM Comput. Surv., vol. 16, no. 3, pp. 319-348, Sep. 1984.
-
(1984)
ACM Comput. Surv
, vol.16
, Issue.3
, pp. 319-348
-
-
Quinn, M.J.1
Deo, N.2
-
36
-
-
51949098112
-
Classification using intersection kernel support vector machines is efficient
-
Jun.
-
S. Maji, A. C. Berg, J. Malik, "Classification using intersection kernel support vector machines is efficient," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2008, pp. 1-8.
-
(2008)
Proc IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)
, pp. 1-8
-
-
Maji, S.1
Berg, A.C.2
Malik, J.3
-
37
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Mach. Learn., vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Mach. Learn
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
38
-
-
0032139235
-
The random subspace method for constructing decision forests
-
Aug.
-
T. K. Ho, "The random subspace method for constructing decision forests," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, pp. 832-844, Aug. 1998.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.20
, Issue.8
, pp. 832-844
-
-
Ho, T.K.1
-
39
-
-
21644433634
-
Xen and the art of virtualization
-
Dec.
-
P. Barham et al., "Xen and the art of virtualization," ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164-177, Dec. 2003.
-
(2003)
ACM SIGOPS Oper. Syst. Rev
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
-
40
-
-
84882639451
-
Malware detection by behavioural sequential patterns
-
M. Ahmadi, A. Sami, H. Rahimi, B. Yadegari, "Malware detection by behavioural sequential patterns," Comput. Fraud Secur., vol. 2013, no. 8, pp. 11-19, 2013.
-
(2013)
Comput. Fraud Secur
, vol.2013
, Issue.8
, pp. 11-19
-
-
Ahmadi, M.1
Sami, A.2
Rahimi, H.3
Yadegari, B.4
-
41
-
-
84960934168
-
-
VirusTotal. Feb [Online] Available
-
VirusTotal. (Feb. 2015). File Types Statistics. [Online]. Available: https://www.virustotal.com/en/statistics/
-
(2015)
File Types Statistics
-
-
-
42
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, P. Laskov, "Learning and classification of malware behavior," in Proc. 5th Int. Conf. Detection Intrusions Malware Vulnerability Assessment (DIMVA), 2008, pp. 108-125.
-
(2008)
Proc. 5th Int. Conf. Detection Intrusions Malware Vulnerability Assessment (DIMVA)
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
43
-
-
84863611404
-
Momentum: Metamorphic malware exploration techniques using MSA signatures
-
Mar
-
P. Vinod, V. Laxmi, M. S. Gaur, G. Chauhan, "Momentum: Metamorphic malware exploration techniques using MSA signatures," in Proc. Int. Conf. Innov. Inf. Technol. (IIT), Mar. 2012, pp. 232-237.
-
(2012)
Proc. Int. Conf. Innov. Inf. Technol. (IIT)
, pp. 232-237
-
-
Vinod, P.1
Laxmi, V.2
Gaur, M.S.3
Chauhan, G.4
-
44
-
-
79955074151
-
Improving antivirus accuracy with hypervisor assisted analysis
-
May
-
D. Quist, L. Liebrock, J. Neil, "Improving antivirus accuracy with hypervisor assisted analysis," J. Comput. Virol., vol. 7, no. 2, pp. 121-131, May 2011.
-
(2011)
J. Comput. Virol
, vol.7
, Issue.2
, pp. 121-131
-
-
Quist, D.1
Liebrock, L.2
Neil, J.3
-
45
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognit. Lett
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
46
-
-
0016870630
-
An algorithm for subgraph isomorphism
-
Jan.
-
J. R. Ullmann, "An algorithm for subgraph isomorphism," J. ACM, vol. 23, no. 1, pp. 31-42, Jan. 1976.
-
(1976)
J ACM
, vol.23
, Issue.1
, pp. 31-42
-
-
Ullmann, J.R.1
-
47
-
-
35248884846
-
Graph clustering using the weighted minimum common supergraph
-
Berlin, Germany: Springer-Verlag
-
H. Bunke, P. Foggia, C. Guidobaldi, M. Vento, "Graph clustering using the weighted minimum common supergraph," in Graph Based Representations in Pattern Recognition (Lecture Notes in Computer Science), vol. 2726. Berlin, Germany: Springer-Verlag, 2003, pp. 235-246.
-
(2003)
Graph Based Representations in Pattern Recognition (Lecture Notes in Computer Science)
, vol.2726
, pp. 235-246
-
-
Bunke, H.1
Foggia, P.2
Guidobaldi, C.3
Vento, M.4
-
48
-
-
84960942412
-
-
Microsoft. Feb. [Online] Available
-
Microsoft. (Feb. 2015). Kernel Object. [Online]. Available: https://msdn. microsoft.com/en-us/library/ms724485%28VS.85%29.aspx
-
(2015)
Kernel Object
-
-
-
49
-
-
85026953361
-
-
Boost-Software. Feb. [Online] Available
-
Boost-Software. (Feb. 2015). Graph Library. [Online]. Available: http://sourceforge.net/projects/boost/files/boost/1.57.0/boost-1-57-0.tar. gz/download
-
(2015)
Graph Library
-
-
-
50
-
-
84906690415
-
Improving high-performance GPU graph traversal with compression
-
Berlin, Germany: Springer-Verlag
-
K. Kaczmarski, P. Przymus, P. Rzazewski, "Improving high-performance GPU graph traversal with compression," in New Trends in Database and Information Systems II (Advances in Intelligent Systems and Computing), vol. 312. Berlin, Germany: Springer-Verlag, 2015, pp. 201-214.
-
(2015)
New Trends in Database and Information Systems II (Advances in Intelligent Systems and Computing)
, vol.312
, pp. 201-214
-
-
Kaczmarski, K.1
Przymus, P.2
Rzazewski, P.3
-
51
-
-
78650024495
-
AccessMiner: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, E. Kirda, "AccessMiner: Using system-centric models for malware protection," in Proc. 17th ACM Conf. Comput. Commun. Secur. (CCS), 2010, pp. 399-412.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
52
-
-
84875646496
-
Experiments with malware visualization
-
Y. Wu and R. H. C. Yap, "Experiments with malware visualization," in Proc. 9th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment (DIMVA), vol. 7591. 2013, pp. 123-133.
-
(2013)
Proc. 9th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment (DIMVA)
, vol.7591
, pp. 123-133
-
-
Wu, Y.1
Yap, R.H.C.2
-
53
-
-
77949354717
-
Visual analysis of malware behavior using treemaps and thread graphs
-
Oct.
-
P. Trinius, T. Holz, J. Gobel, F. C. Freiling, "Visual analysis of malware behavior using treemaps and thread graphs," in Proc. 6th Int. Workshop Visualizat. Cyber Secur. (VizSec), Oct. 2009, pp. 33-38.
-
(2009)
Proc. 6th Int. Workshop Visualizat. Cyber Secur. (VizSec)
, pp. 33-38
-
-
Trinius, P.1
Holz, T.2
Gobel, J.3
Freiling, F.C.4
-
55
-
-
84869049724
-
Visualization of shared system call sequence relationships in large malware corpora
-
J. Saxe, D. Mentis, C. Greamo, "Visualization of shared system call sequence relationships in large malware corpora," in Proc. 9th Int. Symp. Visualizat. Cyber Secur. (VizSec), 2012, pp. 33-40.
-
(2012)
Proc. 9th Int. Symp. Visualizat. Cyber Secur. (VizSec)
, pp. 33-40
-
-
Saxe, J.1
Mentis, D.2
Greamo, C.3
-
56
-
-
84863060804
-
A system call analysis method with mapreduce for malware detection
-
Dec
-
S.-T. Liu, H.-C. Huang, Y.-M. Chen, "A system call analysis method with mapreduce for malware detection," in Proc. IEEE 17th Int. Conf. Parallel Distrib. Syst. (ICPADS), Dec. 2011, pp. 631-637.
-
(2011)
Proc IEEE 17th Int. Conf. Parallel Distrib. Syst. (ICPADS)
, pp. 631-637
-
-
Liu, S.-T.1
Huang, H.-C.2
Chen, Y.-M.3
|