Facet browsing currently unavailable
Page 1 of 10211 results
Sort by: relevance publication year
Using Static Program Analysis to Aid Intrusion Detection BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
On the Effectiveness of Techniques to Detect Phishing Sites BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Behavioral and Structural Properties of Malicious Code BOOK CHAPTER published in Advances in Information Security |
Static Disassembly and Code Analysis BOOK CHAPTER published in Advances in Information Security |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Leveraging User Interactions for In-Depth Testing of Web Applications BOOK CHAPTER published in Lecture Notes in Computer Science |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users BOOK CHAPTER published 2015 in Detection of Intrusions and Malware, and Vulnerability Assessment |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples BOOK CHAPTER published 2013 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Polymorphic Worm Detection Using Structural Information of Executables BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
Static Analysis BOOK CHAPTER published 2020 in Malware Analysis and Detection Engineering |
Static Malware Detection BOOK CHAPTER published 30 November 2022 in Intelligent Mobile Malware Detection |
Abusing Social Networks for Automated User Profiling BOOK CHAPTER published 2010 in Lecture Notes in Computer Science |
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation BOOK CHAPTER published 2019 in Detection of Intrusions and Malware, and Vulnerability Assessment |
You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures BOOK CHAPTER published 2021 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 BOOK CHAPTER published 2007 in Advances in Information Security |
Stream Mining for Security Applications BOOK CHAPTER published 7 December 2011 in Data Mining Tools for Malware Detection |
Data Mining for Security Applications BOOK CHAPTER published 7 December 2011 in Data Mining Tools for Malware Detection |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Collaborative Malware Detection Networks BOOK CHAPTER published 19 November 2013 in Intrusion Detection Networks |
Principles of Secure Information Flow Analysis BOOK CHAPTER published in Advances in Information Security |