Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 44569 results
Sort by: relevance publication year

PoX: Protecting users from malicious Facebook applications

PROCEEDINGS ARTICLE published March 2011 in 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)

Authors: Manuel Egele | Andreas Moser | Christopher Kruegel | Engin Kirda

BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients

PROCEEDINGS ARTICLE published July 2011 in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)

Authors: Martin Szydlowski | Ben Y. Zhao | Engin Kirda | Christopher Kruegel

Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection

PROCEEDINGS ARTICLE published February 2011 in 2011 4th IFIP International Conference on New Technologies, Mobility and Security

Authors: Gregory Blanc | Ruo Ando | Youki Kadobayashi

An experimental analysis for malware detection using extrusions

PROCEEDINGS ARTICLE published September 2011 in 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)

Authors: Sunny Behal | Krishan Kumar

Kernel-based Behavior Analysis for Android Malware Detection

PROCEEDINGS ARTICLE published December 2011 in 2011 Seventh International Conference on Computational Intelligence and Security

Authors: Takamasa Isohara | Keisuke Takemori | Ayumu Kubota

Trustworthiness Benchmarking of Web Applications Using Static Code Analysis

PROCEEDINGS ARTICLE published August 2011 in 2011 Sixth International Conference on Availability, Reliability and Security

Authors: Afonso Araujo Neto | Marco Vieira

Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers

PROCEEDINGS ARTICLE published December 2011 in 2011 Seventh International Conference on Computational Intelligence and Security

Authors: Jozsef Hegedus | Yoan Miche | Alexander Ilin | Amaury Lendasse

The static security analysis based on predicting section

PROCEEDINGS ARTICLE published August 2011 in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)

Authors: Ge Rundong | Liu Wenying

Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept

PROCEEDINGS ARTICLE published July 2011 in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Authors: Jonathan J. Blount | Daniel R. Tauritz | Samuel A. Mulder

Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families

PROCEEDINGS ARTICLE published October 2011 in 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing

Authors: Muhammad Adeel | Laurissa N. Tokarchuk

Design and prototyping of framework for automated continuous malware collection and analysis

PROCEEDINGS ARTICLE published October 2011 in 2011 Carnahan Conference on Security Technology

Authors: Keiji Takeda | Masayoshi Mizutani

Static Analysis for Efficient Hybrid Information-Flow Control

PROCEEDINGS ARTICLE published June 2011 in 2011 IEEE 24th Computer Security Foundations Symposium

Authors: Scott Moore | Stephen Chong

Communities Detection with Applications to Real-World Networks Analysis

PROCEEDINGS ARTICLE published December 2011 in 2011 Seventh International Conference on Computational Intelligence and Security

Authors: Bo Yang

Integrated soft computing for Intrusion Detection on computer network security

PROCEEDINGS ARTICLE published December 2011 in 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)

Authors: Sirikanjana Pilabutr | Preecha Somwang | Surat Srinoy

Dynamic Malware Detection by Similarity Measures between Behavioral Profiles: An Introduction in French

PROCEEDINGS ARTICLE published May 2011 in 2011 Conference on Network and Information Systems Security

Authors: Jean-Marie Borello | Ludovic Me | Eric Filiol

Data Mining for Malicious Code Detection and Security Applications

PROCEEDINGS ARTICLE published September 2011 in 2011 European Intelligence and Security Informatics Conference

Authors: Bhavani Thuraisingham

Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities

PROCEEDINGS ARTICLE published July 2011 in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Authors: George Chatzieleftheriou | Panagiotis Katsaros

Enhancing Mobile Malware Detection with Social Collaboration

PROCEEDINGS ARTICLE published October 2011 in 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing

Authors: Liu Yang | Vinod Ganapathy | Liviu Iftode

Ensemble based categorization and adaptive model for malware detection

PROCEEDINGS ARTICLE published December 2011 in 2011 7th International Conference on Information Assurance and Security (IAS)

Authors: Muhammad Najmi Ahmad Zabidi | Mohd Aizaini Maarof | Anazida Zainal

SoftWare IMmunization (SWIM) - A Combination of Static Analysis and Automatic Testing

PROCEEDINGS ARTICLE published July 2011 in 2011 IEEE 35th Annual Computer Software and Applications Conference

Authors: J. Jenny Li | John Palframan | Jim Landwehr