|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 138 occurrences of 79 keywords
|
|
|
Results
Found 69 publication records. Showing 69 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis |
A Study of Malcode-Bearing Documents. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Sandbox Diversity, Intrusion Detection, N-gram |
89 | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
Host Based Intrusion Detection using Machine Learning. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Attila Ondi, Richard Ford |
Modeling malcode with Hephaestus: beyond simple spread. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Hephaestus, code-red, virus-spread simulation |
55 | Jan A. Bergstra, Alban Ponse |
A Bypass of Cohen's Impossibility Result. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
Malcode, Program algebra, Worm, Virus, Thread algebra |
44 | M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
Embedded Malware Detection Using Markov n-Grams. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
44 | William Enck, Patrick D. McDaniel, Trent Jaeger |
PinUP: Pinning User Files to Known Applications. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici |
Improving the Detection of Unknown Computer Worms Activity Using Active Learning. |
KI |
2007 |
DBLP DOI BibTeX RDF |
Malcode Detection, Classification, Support Vector Machines, Active Learning |
31 | Markus Engelberth |
Social Malcode: benutzerabhängige Schadprogramme. |
|
2013 |
RDF |
|
31 | Zheng Shan, Haoran Guo, Jianmin Pang |
BTMD: A Framework of Binary Translation Based Malcode Detector. |
CyberC |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici |
Unknown malcode detection and the imbalance problem. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Robert Moskovitch, Clint Feher, Yuval Elovici |
A Chronological Evaluation of Unknown Malcode Detection. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Unknown Malicious File Detection, Classification |
31 | Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici |
Unknown Malcode Detection Using OPCODE Representation. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
OpCode, Classification, Malicious Code Detection |
31 | Robert Moskovitch, Clint Feher, Yuval Elovici |
Unknown malcode detection - A chronological evaluation. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici |
Unknown malcode detection via text categorization and the imbalance problem. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ken Dunham |
Source Code Implications for Malcode. |
Inf. Secur. J. A Glob. Perspect. |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Farnam Jahanian (eds.) |
Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006 |
WORM |
2006 |
DBLP BibTeX RDF |
|
31 | David M. Nicol |
The impact of stochastic variance on worm propagation and detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
modeling, detection, worms, variance |
31 | Niels Provos, Joe McClain, Ke Wang 0009 |
Search worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
index filtering, security, search, signature, internet worms |
31 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
31 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
31 | Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto |
Signature metrics for accurate and automated worm detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
network worms, worm signatures, traffic analysis |
31 | Xuxian Jiang, Dongyan Xu |
Profiling self-propagating worms via behavioral footprinting. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
behavioral footprinting, content signature, worm profiling, worms |
31 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
On the impact of dynamic addressing on malware propagation. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
private address space, network security, internet worms, network address translation |
31 | Mohamed R. Chouchane, Arun Lakhotia |
Using engine signature to detect metamorphic malware. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
metamorphic engine, virus scanner |
31 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
31 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
31 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
31 | Ken Dunham |
Source Code Implications for Malcode. |
Inf. Secur. J. A Glob. Perspect. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Richard Ford |
Malcode Mysteries Revealed. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
self-replicating code, SQL.Slammer worm, worms, viruses |
31 | Ibrahim K. El-Far, Richard Ford, Attila Ondi, Manan Pancholi |
Suppressing the Spread of Email Malcode using Short-term Message Recall. |
J. Comput. Virol. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Vijay Atluri, Angelos D. Keromytis (eds.) |
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 |
WORM |
2005 |
DBLP BibTeX RDF |
|
31 | Kurt Rohloff, Tamer Basar |
The detection of RCS worm epidemics. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
31 | Milan Vojnovic, Ayalvadi J. Ganesh |
On the effectiveness of automatic patching. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates |
31 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Worm evolution tracking via timing analysis. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
methods of attribution, network security, internet worms |
31 | David J. Malan, Michael D. Smith 0001 |
Host-based detection of worms through peer-to-peer cooperation. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services |
31 | Zesheng Chen, Chuanyi Ji |
A self-learning worm using importance scanning. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
importance scanning, self-learning worm, modeling, worm propagation |
31 | David W. Richardson, Steven D. Gribble, Edward D. Lazowska |
The limits of global scanning worm detectors in the presence of background noise. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
scanning worms, worm models, computer security, worm detection, computer worms |
31 | Brian Hernacki |
Emerging threats. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis |
Defending against hitlist worms using network address space randomization. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
network security, randomization, traffic analysis, internet worms |
31 | Stefan Savage |
Scalable internet threat monitoring. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Vern Paxson |
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Mohammad Mannan, Paul C. van Oorschot |
On instant messaging worms, analysis and countermeasures. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
instant messaging worms, scale-free networks |
31 | Vern Paxson (eds.) |
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 |
WORM |
2004 |
DBLP BibTeX RDF |
|
31 | James E. Just, Mark R. Cornwell |
Review and analysis of synthetic diversity for breaking monocultures. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
diversity, vulnerability, n-version programming |
31 | Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting |
A hybrid quarantine defense. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network modeling and simulation, worm detection systems, network security, worms |
31 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
31 | Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia |
A behavioral approach to worm detection. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection |
31 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
31 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
31 | Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson |
Toward understanding distributed blackhole placement. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms |
31 | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang |
A study of mass-mailing worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network security, traffic analysis, internet worms |
31 | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson |
Preliminary results using scale-down to explore worm dynamics. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
scaledown, slammer, simulation, modeling, worms |
31 | Stuart Staniford, Stefan Savage (eds.) |
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 |
WORM |
2003 |
DBLP BibTeX RDF |
|
31 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
31 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
31 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
Worm propagation modeling and analysis under dynamic quarantine defense. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
dynamic quarantine, epidemic model, worm propagation |
31 | Linda Briesemeister, Patrick Lincoln, Phillip A. Porras |
Epidemic profiles and defense of scale-free networks. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
computer epidemics, self-propagating malicious code, scale-free networks |
31 | Dan Ellis |
Worm anatomy and model. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
network security, worm, network modeling, turing machine |
31 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
31 | Yang Wang 0008, Chenxi Wang |
Modeling the effects of timing parameters on virus propagation. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, epidemiology, computer virus, anti-virus |
31 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
31 | Darrell M. Kienzle, Matthew C. Elder |
Recent worms: a survey and trends. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
survey, malicious code |
31 | Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand |
Experiences with worm propagation simulations. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
simulation, latency, bandwidth, internet worms |
22 | Duc T. Ha, Hung Q. Ngo 0001 |
On the trade-off between speed and resiliency of Flash worms and similar malcodes. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel |
Noninvasive Methods for Host Certification. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
network security, Certification, malware, assurance |
22 | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo |
On the infeasibility of modeling polymorphic shellcode. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
shellcode, polymorphism, statistical models, signature generation |
22 | Attila Ondi |
A drawback of current anti-virus simulations: the need for background traffic. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
background traffic, virus-spread simulation |
22 | Adam J. O'Donnell, Harish Sethu |
Software Diversity as a Defense against Viral Propagation: Models and Simulations. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #69 of 69 (100 per page; Change: )
|
|