The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malwares with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006-2010 (19) 2012-2016 (18) 2017-2018 (23) 2019-2023 (16)
Publication types (Num. hits)
article(23) inproceedings(48) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 32 occurrences of 30 keywords

Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
134Jusuk Lee, Kyoochang Jeong, Heejo Lee Detecting metamorphic malwares using code graphs. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code graph, metamorphic malware, static analysis, code obfuscation
112Yong-Joon Park, Zhao Zhang, Songqing Chen Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
112Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
109Keehyung Kim, Byung Ro Moon Malware detection based on dependency graph using hybrid genetic algorithm. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF genetic algorithm, dependency graph, malware detection, subgraph isomorphism
36Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao How to Locate a Target Binary Process and Its Derivatives in System Emulator. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF system emulator, virtualization, instrumentation, malwares, multiprocessing
25Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava 0001, Alireza Jolfaei Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Benjamin Marais Améliorations des outils de détection de malwares par analyse statique grâce à des mécanismes d'intelligence artificielle. (Static analysis malware detection tools enhanced by artificial intelligence mechanisms). Search on Bibsonomy 2023   RDF
25Do Thi Thu Hien, The Duy Phan, Hao Le Anh, Lan Nguyen Duy, Nghi Hoang Khoa, Van-Hau Pham A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation. Search on Bibsonomy SoICT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25N. Saranya, V. Manikandan On viability of detecting malwares online using ensemble classification method with performance metrics. Search on Bibsonomy Comput. Intell. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Ben Abdel Ouahab Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, Bouhorma Mohammed Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. Search on Bibsonomy NISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo An Ensemble Learning Approach to Detect Malwares Based on Static Information. Search on Bibsonomy ICA3PP (3) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. Search on Bibsonomy SP (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Louison Gitzinger Surviving the massive proliferation of mobile malware. (Survivre à la prolifération massive des malwares sur mobile). Search on Bibsonomy 2020   RDF
25Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee, Gia Nhu Nguyen An Ensemble Voted Feature Selection Technique for Predictive Modeling of Malwares of Android. Search on Bibsonomy Int. J. Inf. Syst. Model. Des. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Easwaramoorthy Arul, Venugopal Manikandan Dynamic runtime protection technique against the file system injecting malwares. Search on Bibsonomy Int. J. Bus. Intell. Data Min. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares. Search on Bibsonomy Int. J. Mach. Learn. Cybern. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Anand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar Anatomizing Android Malwares. Search on Bibsonomy APSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Gabriel Bastos, Artur Marzano, Elverton C. Fazzion, Osvaldo L. H. M. Fonseca, Ítalo Cunha, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves Identificação Automática de Servidores C&C e Identificação de Variantes de Malwares Bashlite e Mirai. Search on Bibsonomy SBRC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Ben Abdel Ouahab Ikram, Bouhorma Mohammed, Boudhir Anouar Abdelhakim, Lotfi El Aachak, Bassam A. Zafar Machine learning application for malwares classification using visualization technique. Search on Bibsonomy SCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Soussi Ilham, Abderrahim Ghadi, Boudhir Anouar Abdelhakim Deep learning for detecting Android malwares. Search on Bibsonomy SCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Jiwon Hong, Sanghyun Park 0003, Sang-Wook Kim, Dongphil Kim, Wonho Kim Classifying malwares for identification of author groups. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Sidney Marlon Lopes de Lima, Heverton Kleidson de Lima Silva, João Henrique da Silva Luz, Samuel Lopes de Paula Silva, Hercília Juliana do Nascimento Lima, Anna Beatriz Augusta de Andrade, Alisson Marques da Silva Antivírus dotado de Rede Neural Artificial visando Detectar Malwares Preventivamente. Search on Bibsonomy Braz. J. Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad 0001, Jong Weon Lee 0002, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Mahmood Awan, Irfan Mehmood Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Danial Javaheri, Mehdi Hosseinzadeh 0001 A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Yoshihiro Oyama Trends of anti-analysis operations of malwares observed in API call logs. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001, Angelo Spognardi DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Yu Liu 0004, Kai Guo, Xiangdong Huang, Zhou Zhou, Yichi Zhang Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods. Search on Bibsonomy Mob. Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Suchul Lee, Sungho Kim, Sungil Lee, Jaehyuk Choi 0002, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Naoki Hashimoto, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning. Search on Bibsonomy INNS Conference on Big Data The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Syed Fakhar Bilal, Saba Bashir, Farhan Hassan Khan, Haroon Rasheed Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining. Search on Bibsonomy INTAP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25João M. Ceron, Cíntia B. Margi, Lisandro Z. Granville MARS: uma arquitetura para análise de malwares utilizando SDN. Search on Bibsonomy SBRC Companion The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Shay Nachum, Assaf Schuster, Opher Etzion Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares. Search on Bibsonomy CSCML The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Mourad Leslous Highlight and execute suspicious paths in Android malware. (Mettre en avant et exécuter les chemins suspicieux dans les malwares Android). Search on Bibsonomy 2018   RDF
25Ali Shuja Siddiqui, Chia-Che Lee, Fareena Saqib Hardware based protection against malwares by PUF based access control mechanism. Search on Bibsonomy MWSCAS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001 Analysis of DDoS-Capable IoT Malwares. Search on Bibsonomy FedCSIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Dong Shen, Xiaojing Su, Zhoujun Li 0001 HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Sevil Sen, Ahmet Ilhan Aysan, John A. Clark SAFEDroid: Using Structural Features for Detecting Android Malwares. Search on Bibsonomy ATCS/SePrIoT@SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Soussi Ilham, Abderrahim Ghadi Detection and Classification of Malwares in Mobile Applications. Search on Bibsonomy SCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Shahrooz Pooryousef, Kazim Fouladi Proposing a New Feature for Structure-Aware Analysis of Android Malwares. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Hiroaki Tanaka, Shingo Yamaguchi On modeling and simulation of the behavior of IoT malwares Mirai and Hajime. Search on Bibsonomy ISCE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Xi Luo, Liming Wang, Zhen Xu 0009, Jing Yang, Mo Sun, Jing Wang DGASensor: Fast Detection for DGA-Based Malwares. Search on Bibsonomy ICCBN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Fadi Mohsen, Halil Bisgin, Zachary Scott, Kyle Strait Detecting Android Malwares by Mining Statically Registered Broadcast Receivers. Search on Bibsonomy CIC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25João Marcelo Ceron MARS: uma arquitetura para análise de malwares utilizando SDN. Search on Bibsonomy 2017   RDF
25Lingling Zeng, Min Lei, Wei Ren 0002, Shiqi Deng Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal. Search on Bibsonomy 3PGCIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Linhai Song, Heqing Huang, Wu Zhou, Wenfei Wu, Yiying Zhang 0005 Learning from Big Malwares. Search on Bibsonomy APSys The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Guillaume Bonfante, Julien Oury Nogues Function Classification for the Retro-Engineering of Malwares. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25K. P. Deepta, A. Salim Detecting Malwares Using Dynamic Call Graphs and Opcode Patterns. Search on Bibsonomy ICACDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Sun Hao, Wen Wang, Huabiao Lu, Peige Ren AutoMal: automatic clustering and signature generation for malwares based on the network flow. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Emre Aydogan, Sevil Sen Automatic Generation of Mobile Malwares Using Genetic Programming. Search on Bibsonomy EvoApplications The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Aurélien Thierry Désassemblage et détection de logiciels malveillants auto-modifiants. (Disassembly and detection of self-modifying malwares). Search on Bibsonomy 2015   RDF
25Ashu Sharma, Sanjay Kumar Sahay Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
25Umer Asgher, Fahad Moazzam Dar, Ali Hamza, Abdul Moeed Paracha Analysis of Increasing Malwares and Cyber Crimes Using Economic Approach. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
25Ekta Gandotra, Divya Bansal, Sanjeev Sofat Integrated Framework for Classification of Malwares. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Dan Li, Chaoge Liu, Xu Cui, Xiang Cui Sniffing and propagating malwares through WPAD deception in LANs. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Alan P. Sprague, Adam Rhodes, Gary Warner Using closed frequent sets to cluster malwares. Search on Bibsonomy ICAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Divyajyoti Das, Somesh Nanda Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed Handset Malwares Threats Feature Extraction Based on Behavior Analysis. Search on Bibsonomy Comput. Inf. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Wenhua Luo, Na Li, Yanjun Tang Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Mojtaba Eskandari, Sattar Hashemi A graph mining approach for detecting unknown malwares. Search on Bibsonomy J. Vis. Lang. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert 0001, Azzam Mourad Towards Smart Anti-Malwares for Battery-Powered Devices. Search on Bibsonomy NTMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Seyed Emad Armoun, Sattar Hashemi A General Paradigm for Normalizing Metamorphic Malwares. Search on Bibsonomy FIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Geoffroy Gueguen Van Wijngaarden grammars, metamorphism and K-ary malwares Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
25Hossein Rouhani Zeidanloo, Farzaneh Tabatabaei, Payam Vahdani Amoli, Atefeh Tajpour All About Malwares (Malicious Codes). Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
25Michal Szczepanik, Ireneusz J. Jozwiak Detecting Malwares in Honeynet Using a Multi-agent System. Search on Bibsonomy NDT (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Michal Szczepanik, Ireneusz J. Józwiak Detecting New and Unknown Malwares Using Honeynet. Search on Bibsonomy MISSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. Search on Bibsonomy DETER The full citation details ... 2007 DBLP  BibTeX  RDF
25Kazumasa Omote, Takeshi Shimoyama, Satoru Torii Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak Monitoring Smartphones for Anomaly Detection. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF monitoring, anomaly detection, smartphones
22Wei Yan, Erik Wu Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. Search on Bibsonomy Complex (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, cloud computing, malware, anti-virus
22Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF darknet monitoring, live network protection, alert system
22Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic
22Muazzam Siddiqui, Morgan C. Wang, Joohan Lee Detecting Trojans Using Data Mining Techniques. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly
22Sébastien Josse Secure and advanced unpacking using computer emulation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis
22Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
Displaying result #1 - #76 of 76 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license