Facet browsing currently unavailable
Page 1 of 124843 results
Sort by: relevance publication year
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Exploring Multiple Execution Paths for Malware Analysis PROCEEDINGS ARTICLE published May 2007 in 2007 IEEE Symposium on Security and Privacy (SP '07) |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Improving Signature Testing through Dynamic Data Flow Analysis PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Improving Signature Testing through Dynamic Data Flow Analysis PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
A layout-similarity-based approach for detecting phishing pages PROCEEDINGS ARTICLE published 2007 in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 |
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
MetaAware: Identifying Metamorphic Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
MetaAware: Identifying Metamorphic Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Twenty-Third Annual Computer Security Applications Conference - TOC PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Twenty-Third Annual Computer Security Applications Conference - Title PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Twenty-Third Annual Computer Security Applications Conference - Copyright PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Twenty-Third Annual Computer Security Applications Conference - Cover PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |