|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14 occurrences of 10 keywords
|
|
|
Results
Found 26 publication records. Showing 26 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Ge Cong, Mehmet Esser, Bahram Parvin, George Bebis |
Shape Metamorphism using p-Laplacian Equation. |
ICPR (4) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
44 | Ramkumar Chinchani, Eric van den Berg |
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Farooque Hassan Kumbhar, Syed Taha Ali |
Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT. |
FIT |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Rui Luo, Zihong Zhang, Wei Xiong |
Coupling Model Prediction of Fresh Grape Metamorphism in Cold Chain Transportation. |
IWCMC |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Gewu Bu, Wassim Hana, Maria Potop-Butucaru |
E-IOTA: an efficient and fast metamorphism for IOTA. |
BRAINS |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Tomoya Sasaki, MHD Yamen Saraiji, Charith Lasantha Fernando, Kouta Minamizawa, Masahiko Inami |
MetaLimbs: multiple arms interaction metamorphism. |
SIGGRAPH Emerging Technologies |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray |
Unveiling metamorphism by abstract interpretation of code properties. |
Theor. Comput. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. |
PPREW@ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Ludovic Brucker, Emmanuel P. Dinnat, Ghislain Picard, Nicolas Champollion |
Effect of Snow Surface Metamorphism on Aquarius L-Band Radiometer Observations at Dome C, Antarctica. |
IEEE Trans. Geosci. Remote. Sens. |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Keisuke Nakano 0001 |
Metamorphism in jigsaw. |
J. Funct. Program. |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Geoffroy Gueguen |
Van Wijngaarden Grammars and Metamorphism. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Geoffroy Gueguen |
Van Wijngaarden grammars, metamorphism and K-ary malwares |
CoRR |
2010 |
DBLP BibTeX RDF |
|
32 | Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray, Kevin Coogan, Gregg M. Townsend |
Modelling Metamorphism by Abstract Interpretation. |
SAS |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Kai Yang, Jonathan F. Huntington, Melissa A. Quigley, K. Scott, Peter Mason |
Mapping the effects of regional metamorphism and hydrothermal alteration in the Mount Isa Valley, Queensland, Australia, using airborne hyperspectral data. |
IGARSS |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin |
Obfuscation: The Hidden Malware. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
packer, metamorphism, computer security, polymorphism, malware, obfuscation |
29 | Eric Filiol, Grégoire Jacob, Mickaël Le Liard |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Black-box analysis, Metamorphism, Detection model, Polymorphism, Malware, Malware detection, Antivirus |
29 | Eric Filiol |
Formalisation and implementation aspects of K -ary (malicious) codes. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism |
22 | Pavel V. Zbitskiy |
Code mutation techniques by means of formal grammars and automatons. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-level polymorphic shellcode detection using emulation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Wing Wong, Mark Stamp 0001 |
Hunting for metamorphic engines. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Network-Level Polymorphic Shellcode Detection Using Emulation. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jeremy Gibbons |
Streaming Representation-Changers. |
MPC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Martin Erwig |
Categorical Programming with Abstract Data Types. |
AMAST |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #26 of 26 (100 per page; Change: )
|
|