-
1
-
-
84963722009
-
-
Avast Internet [Feb. 22, 2015].
-
Avast. "Avast 2015." Internet: https://www.avast.com, 2015 [Feb. 22, 2015].
-
(2015)
Avast 2015
-
-
-
2
-
-
85047039272
-
-
AV-test Malware [Feb. 22 2015]
-
AV-test, Malware, 2014. The Independent IT-Security Institute 2014. http://www.av-test.org/en/statistics/malware/[Feb. 22, 2015].
-
(2014)
The Independent IT-Security Institute 2014
-
-
-
4
-
-
84963757459
-
-
Cuckoo Foundation [Feb. 22 2015]
-
Cuckoo Foundation. "Automated Malware Analysis-Cuckoo Sandbox." Internet: http://www.cuckoosandbox.org/, 2014 [Feb. 22, 2015].
-
(2014)
Automated Malware Analysis-Cuckoo Sandbox
-
-
-
5
-
-
84963775687
-
Learning and classification of malware behavior
-
Paris, France: Springer
-
K. Rieck, T. Holz, C. Willems, P. Düssel and P. Laskov Learning and Classification of Malware Behavior, 5th Int. Conf. DIMVA 2008 Paris, France: Springer, 2012.
-
(2012)
5th Int. Conf. DIMVA 2008
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
6
-
-
79958743806
-
Automatic of analysis of malware behavior using machine learning
-
IOS Press Amsterdam
-
K. Rieck, P. Trinius, C. Willems and T. Holz Automatic of Analysis of Malware Behavior using Machine Learning, 19th Vol. Issue 4 Jour. of Comp. Sec. 2011 Amsterdam, The Netherlands: IOS Press Amsterdam, 2012.
-
(2012)
19th Vol. Issue 4 Jour. of Comp. Sec. 2011 Amsterdam, the Netherlands
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
7
-
-
0041382385
-
-
Jan. [Feb. 22 2015]
-
L. Breiman. (2001, Jan.). Random Forests. [Online]. Available:http://oz. berkeley.edu/-breiman/randomforest2001 [Feb. 22, 2015].
-
(2001)
Random Forests
-
-
Breiman, L.1
-
8
-
-
84963760222
-
Towards understanding malware behaviour by the extraction of API calls
-
Australia: IEEE
-
M. Alazab, S. Venkataraman and P. Watters, Towards Understanding Malware Behaviour by the Extraction of API calls, 2nd CTC 2010 Ballarat (VIC), Australia: IEEE, 2012.
-
(2012)
2nd CTC 2010 Ballarat (VIC)
-
-
Alazab, M.1
Venkataraman, S.2
Watters, P.3
-
9
-
-
84963762908
-
-
Dec. 20 [Feb. 22 2015]
-
M. Platts. "The Network Connection Status Icon." Internet: http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx, Dec. 20, 2012 [Feb. 22, 2015].
-
(2012)
The Network Connection Status Icon
-
-
Platts, M.1
-
10
-
-
78651395073
-
Differentiating malware from cleanware using behavioral analysis
-
R. Tian, R. Islam, L. Battern and S. Versteeg, Differentiating Malware from Cleanware Using Behavioral Analysis, 5th Int. Conf. on Malicious and unwanted Software Nancy, France: IEEE, 2010.
-
(2010)
5th Int. Conf. on Malicious and Unwanted Software Nancy France: IEEE
-
-
Tian, R.1
Islam, R.2
Battern, L.3
Versteeg, S.4
-
12
-
-
77954701461
-
Improving the efficiency of dynamic malware analysis
-
U. Bayer, E. Kirda, C. Kruegel Improving the Efficiency of Dynamic Malware Analysis, 25th Symposium On Applied Computing (SAC), Track on Information Security Research and Applications Lusanne, Switzerland, 2010.
-
(2010)
25th Symposium on Applied Computing (SAC), Track on Information Security Research and Applications Lusanne, Switzerland
-
-
Bayer, U.1
Kirda, E.2
Kruegel, C.3
-
13
-
-
84963749487
-
VirusShare
-
Internet: Feb. 22 [Feb. 22 2015]
-
VirusShare. "VirusShare.com-Because Sharing is Caring." Internet: http://virusshare.com/, Feb. 22, 2015 [Feb. 22, 2015].
-
(2015)
VirusShare.com-Because Sharing Is Caring
-
-
-
14
-
-
84941178458
-
-
VirusTotal Internet: [Feb. 22 2015]
-
VirusTotal. "virustotal." Internet: https://www.virustotal.com/, 2015 [Feb. 22, 2015].
-
(2015)
Virustotal
-
-
-
15
-
-
11244260106
-
-
WEKA Internet: [Feb. 22 2015]
-
WEKA. "Weka 3: Data Mining Software in Java." Internet: http://www. cs.waikato.ac.nz/ml/weka/, 2014 [Feb. 22, 2015].
-
(2014)
Weka 3: Data Mining Software in Java
-
-
|