|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
177 | Yan Zhou, W. Meador Inge |
Malware detection using adaptive data compression. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
statistical data compression, machine learning, malware detection |
162 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Dynamic Analysis, Emulator, Rootkit |
156 | V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar |
Signature Generation and Detection of Malware Families. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Static Analysis, Malware Detection, Signature Generation |
146 | Xin Hu 0001, Tzi-cker Chiueh, Kang G. Shin |
Large-scale malware indexing using function-call graphs. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
graph similarity, malware indexing, multi-resolution indexing |
146 | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray |
A semantics-based approach to malware detection. |
ACM Trans. Program. Lang. Syst. |
2008 |
DBLP DOI BibTeX RDF |
abstract interpretation, obfuscation, Malware detection, trace semantics |
132 | Amit Vasudevan |
MalTRAK: Tracking and Eliminating Unknown Malware. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
130 | Ashkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh |
Malware detection based on mining API calls. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
API call, polymorphic/metamorphic malware, portable executable (PE), public dataset, frequent pattern mining, malware detection |
126 | Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee |
Ether: malware analysis via hardware virtualization extensions. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
unpacking, virtualization, dynamic analysis, emulation, malware analysis |
126 | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray |
A semantics-based approach to malware detection. |
POPL |
2007 |
DBLP DOI BibTeX RDF |
abstract interpretation, obfuscation, malware detection, trace semantics |
121 | Lei Liu 0021, Songqing Chen |
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
120 | M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq |
Embedded Malware Detection Using Markov n-Grams. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
116 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
116 | Amit Vasudevan, Ramesh Yerraballi |
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. |
ACSC |
2006 |
DBLP BibTeX RDF |
security, instrumentation, malware |
116 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
111 | Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala |
Fragmented malware through RFID and its defenses. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
111 | Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser 0001, Helmut Veith |
Software transformations to improve malware detection. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
111 | Amit Vasudevan, Ramesh Yerraballi |
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
111 | Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 |
Back to the Future: A Framework for Automatic Malware Removal and System Repair. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
110 | Boris Rozenberg, Ehud Gudes, Yuval Elovici |
A Distributed Framework for the Detection of New Worm-Related Malware. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
malware propagation, collaborative detection, malware detection |
108 | Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni |
How Good Are Malware Detectors at Remediating Infected Systems?. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
software testing, Malware, malware detection |
105 | Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta |
A study of malware in peer-to-peer networks. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
limewire, openFT, peer-to-peer, filtering, malware |
102 | Mihai Christodorescu, Somesh Jha, Christopher Kruegel |
Mining specifications of malicious behavior. |
ISEC |
2008 |
DBLP DOI BibTeX RDF |
behavior-based detection, malspec, differential analysis |
102 | Mihai Christodorescu, Somesh Jha, Christopher Kruegel |
Mining specifications of malicious behavior. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
behavior-based detection, malspec, differential analysis |
102 | Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala |
Static Analyzer of Vicious Executables (SAVE). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
101 | Mengjun Xie, Zhenyu Wu, Haining Wang |
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
101 | José M. Fernandez 0001, Pierre-Marc Bureau |
Optimising malware. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
101 | Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant |
Semantics-Aware Malware Detection. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
100 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
99 | Yean Li Ho, Swee-Huay Heng |
Mobile and ubiquitous malware. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
mobile malware, mobile virus, mobile worm, ubiquitous malware, mobile phone, PDA, smartphone, mobile security, cellphone |
96 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
95 | Yurong Song, Guoping Jiang |
Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
malware propagation, neighborhood saturation, MAC mechanism, wireless sensor networks, model, cellular automata, theoretical analysis |
95 | S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Malware detection using statistical analysis of byte-level file content. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
computer malware, data mining, forensics |
95 | Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq |
IMAD: in-execution malware analysis and detection. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
classification, malware, system call |
95 | Shih-Yao Dai, Sy-Yen Kuo |
MAPMon: A Host-Based Malware Detection Tool. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor |
95 | Jedidiah R. Crandall, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Temporal search: detecting hidden malware timebombs with virtual machines. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, malware, worms |
91 | Matthew Hayes, Andrew Walenstein, Arun Lakhotia |
Evaluation of malware phylogeny modelling systems using automated variant generation. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
91 | Gérard Wagener, Radu State, Alexandre Dulaunoy |
Malware behaviour analysis. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
91 | Pierre-Marc Bureau, José M. Fernandez 0001 |
Optimising Networks Against Malware. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Guoning Hu, Deepak Venugopal |
A Malware Signature Extraction and Detection Method Applied to Mobile Networks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Eric Filiol |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
91 | Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee |
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
89 | Dmitriy Komashinskiy, Igor V. Kotenko |
Integrated Usage of Data Mining Methods for Malware Detection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Behavior-based malware detection, Data mining, Malware |
89 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
85 | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou |
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Malware, Honeypots |
81 | Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee |
Automatic Reverse Engineering of Malware Emulators. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
81 | Qinghua Zhang, Douglas S. Reeves |
MetaAware: Identifying Metamorphic Malware. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
81 | Andreas Moser, Christopher Kruegel, Engin Kirda |
Limits of Static Analysis for Malware Detection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
81 | Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung |
Disassembled code analyzer for malware (DCAM). |
IRI |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen |
VirusMeter: Preventing Your Cellphone from Spies. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
mobile malware, mobile device security, anomaly detection, power consumption |
75 | Yanfang Ye 0001, Tao Li 0001, Yong Chen, Qingshan Jiang |
Automatic malware categorization using cluster ensemble. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
malware categorization, signature, cluster ensemble |
75 | Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
Static CFG analyzer for metamorphic Malware code. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence |
75 | Yanfang Ye 0001, Tao Li 0001, Qingshan Jiang, Zhixue Han, Li Wan |
Intelligent file scoring system for malware detection from the gray list. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
gray list, ensemble, malware detection |
73 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Dynamic Binary Instrumentation-Based Framework for Malware Defense. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware |
73 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
70 | Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario |
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Sohraab Soltani, Syed A. Khayam, Hayder Radha |
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
70 | John V. Harrison |
Enhancing Network Security By Preventing User-Initiated Malware Execution. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
Network Security, Computer Security, Malicious Software, Operating System Security |
66 | Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
A Sense of 'Danger' for Windows Processes. |
ICARIS |
2009 |
DBLP DOI BibTeX RDF |
API Call Sequence, Artificial Immune System, Malware Detection, Dendritic Cell Algorithm |
66 | Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda |
Dynamic Analysis of Malicious Code. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Virus worm, Static analysis, Analysis, Dynamic analysis, API, Malware |
64 | Ulrich Bayer, Engin Kirda, Christopher Kruegel |
Improving the efficiency of dynamic malware analysis. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
dynamic analysis, malware analysis |
64 | Liang Xie 0002, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu |
pBMDS: a behavior-based malware detection system for cellphone devices. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
behavior learning, cellphone malware, system call |
64 | Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma 0004, Jiaxin Zou |
Metamorphic malware detection technology based on aggregating emerging patterns. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, software security, system call, emerging patterns |
61 | Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter |
AGIS: Towards automatic generation of infection signatures. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Thomas Raffetseder, Christopher Krügel, Engin Kirda |
Detecting System Emulators. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Matt Webster, Grant Malcolm |
Detection of metamorphic and virtualization-based malware using algebraic specification. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
Architecture of a morphological malware detector. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Hoai-Nam Nguyen, Yoichi Shinoda |
A novel analytical framework to model malware diffusion in heterogeneous wireless networks. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Hahnsang Kim, Joshua Smith, Kang G. Shin |
Detecting energy-greedy anomalies and mobile malware variants. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
power consumption history, power signature |
60 | P. Kumar Manna, Sanjay Ranka, Shigang Chen |
Analysis of Maximum Executable Length for Detecting Text-Based Malware. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Roberto Perdisci, Andrea Lanzi, Wenke Lee |
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Andreas Moser, Christopher Krügel, Engin Kirda |
Exploring Multiple Execution Paths for Malware Analysis. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling |
The Nepenthes Platform: An Efficient Approach to Collect Malware. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Danilo Bruschi, Lorenzo Martignoni, Mattia Monga |
Detecting Self-mutating Malware Using Control-Flow Graph Matching. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
55 | William Enck, Machigar Ongtang, Patrick D. McDaniel |
On lightweight mobile phone application certification. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
mobile phone security, malware, android |
55 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
54 | Keehyung Kim, Byung Ro Moon |
Malware detection based on dependency graph using hybrid genetic algorithm. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
genetic algorithm, dependency graph, malware detection, subgraph isomorphism |
54 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
54 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
54 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Execution Patterns in Automatic Malware and Human-Centric Attacks. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
security, model, evaluation, IDS, Attack, malware |
54 | Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera |
MAISim: mobile agent malware simulator. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings |
54 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye |
IMDS: intelligent malware detection system. |
KDD |
2007 |
DBLP DOI BibTeX RDF |
OOA mining, PE file, windows API sequence, malware |
51 | Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov |
Botzilla: detecting the "phoning home" of malicious software. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
network intrusion detection, malicious software |
51 | Yong-Joon Park, Zhao Zhang, Songqing Chen |
Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. |
ASAP |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Andrew Brown 0005, Mark Ryan 0001 |
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski |
Detecting Stealth Software with Strider GhostBuster. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Amit Vasudevan, Ramesh Yerraballi |
Stealth Breakpoints. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan |
Enhancing web browser security against malware extensions. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Stanley J. Barr, Samuel J. Cardman, David M. Martin |
A boosting ensemble for the recognition of code sharing in malware. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Brett Stone-Gross, Christo Wilson, Kevin C. Almeroth, Elizabeth M. Belding, Heather Zheng, Konstantina Papagiannaki |
Malware in IEEE 802.11 Wireless Networks. |
PAM |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Xuhua Ding, Wei Yu 0002, Ying Pan |
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu 0003 |
Collecting Internet Malware Based on Client-side Honeypot. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee |
Eureka: A Framework for Enabling Static Malware Analysis. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Krishna K. Ramachandran, Biplab Sikdar 0001 |
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan |
Extensible Web Browser Security. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Moses Garuba, Chunmei Liu, Alicia Nicki Washington |
A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
Displaying result #1 - #100 of 7276 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|