Facet browsing currently unavailable
Page 2 of 2405325 results
Sort by: relevance publication year
Neurlux PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253) |
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries PROCEEDINGS ARTICLE published 2010 in 2010 IEEE Symposium on Security and Privacy |
Improving the efficiency of dynamic malware analysis PROCEEDINGS ARTICLE published 22 March 2010 in Proceedings of the 2010 ACM Symposium on Applied Computing Research funded by Austrian Science Fund (P18764) | Seventh Framework Programme (FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD) |
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Symposium on Security and Privacy (sp 2008) |
Visual-similarity-based phishing detection PROCEEDINGS ARTICLE published 22 September 2008 in Proceedings of the 4th international conference on Security and privacy in communication netowrks Research funded by Austrian Science Fund (P-18764) |
Dynamic Analysis of Malicious Code JOURNAL ARTICLE published August 2006 in Journal in Computer Virology |
FORECAST PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference Research funded by Seventh Framework Programme (257007 (SysSec)) | Österreichische Forschungsförderungsgesellschaft (820854 (TRUDIE)) |
Jarhead analysis and detection of malicious Java applets PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Division of Computer and Network Systems (CNS-0845559CNS-0905537) | Office of Naval Research (N000140911042) |
Improving Signature Testing through Dynamic Data Flow Analysis PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
A quantitative study of accuracy in system call-based malware detection PROCEEDINGS ARTICLE published 15 July 2012 in Proceedings of the 2012 International Symposium on Software Testing and Analysis |
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features PROCEEDINGS ARTICLE published 2020 in Proceedings 2020 Network and Distributed System Security Symposium |
Improving Signature Testing through Dynamic Data Flow Analysis PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
A solution for the automated detection of clickjacking attacks PROCEEDINGS ARTICLE published 13 April 2010 in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security Research funded by Austrian Science Fund (P18764) | Seventh Framework Programme (FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD) |
Detecting Kernel-Level Rootkits Through Binary Analysis PROCEEDINGS ARTICLE published in 20th Annual Computer Security Applications Conference |
Bayesian event classification for intrusion detection PROCEEDINGS ARTICLE published in 19th Annual Computer Security Applications Conference, 2003. Proceedings. |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Detecting System Emulators BOOK CHAPTER published in Lecture Notes in Computer Science |
Behavioral and Structural Properties of Malicious Code BOOK CHAPTER published in Advances in Information Security |
A layout-similarity-based approach for detecting phishing pages PROCEEDINGS ARTICLE published 2007 in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 |
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications PROCEEDINGS ARTICLE published November 2016 in 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) |