Facet browsing currently unavailable
Page 5 of 2405321 results
Sort by: relevance publication year
Anomaly detection of web-based attacks PROCEEDINGS ARTICLE published 27 October 2003 in Proceedings of the 10th ACM conference on Computer and communications security |
Polymorphic Worm Detection Using Structural Information of Executables BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
SecureDroid PROCEEDINGS ARTICLE published 4 December 2017 in Proceedings of the 33rd Annual Computer Security Applications Conference Research funded by U.S. National Science Foundation (CNS-1618629) | WVU Senate Grants for Research and Scholarship (R-16-043) |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Detection of Intrusions and Malware, and Vulnerability Assessment BOOK published 2005 in Lecture Notes in Computer Science |
Detecting spammers on social networks PROCEEDINGS ARTICLE published 6 December 2010 in Proceedings of the 26th Annual Computer Security Applications Conference Research funded by Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559CNS-0905537) |
Federated Learning Assisted IoT Malware Detection Using Static Analysis PROCEEDINGS ARTICLE published December 2022 in Proceedings of the 2022 12th International Conference on Communication and Network Security |
PatchDroid PROCEEDINGS ARTICLE published 9 December 2013 in Proceedings of the 29th Annual Computer Security Applications Conference Research funded by Division of Computer and Network Systems (CNS-1116777) | Office of Naval Research (N000141310102) |
Static and Dynamic Analysis for Android Malware Detection DISSERTATION published |
Combining Dynamic and Static Analysis for Malware Detection DISSERTATION published |
Detecting mobile malware threats to homeland security through static analysis JOURNAL ARTICLE published February 2014 in Journal of Network and Computer Applications |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Industrial control system security-malware botnet detection PROCEEDINGS ARTICLE published October 2016 in 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA) |
Web service engineering with DIWE PROCEEDINGS ARTICLE published 2003 in Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat No 03CH37412) EURMIC-03 |
Towards network containment in malware analysis systems PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Seventh Framework Programme (257007) |
Anomaly detection of web-based attacks PROCEEDINGS ARTICLE published 2003 in Proceedings of the 10th ACM conference on Computer and communication security - CCS '03 |
Message in a bottle PROCEEDINGS ARTICLE published 9 December 2013 in Proceedings of the 29th Annual Computer Security Applications Conference Research funded by Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559, CNS-0905537) | Army Research Office (W911NF0910553) |
MalTRAK: Tracking and Eliminating Unknown Malware PROCEEDINGS ARTICLE published December 2008 in 2008 Annual Computer Security Applications Conference (ACSAC) |
VAMO PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Division of Computer and Network Systems (CNS-1149051) |
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection PROCEEDINGS ARTICLE published 4 December 2017 in Proceedings of the 33rd Annual Computer Security Applications Conference |