Facet browsing currently unavailable
Page 1 of 318223 results
Sort by: relevance publication year
Using Static Program Analysis to Aid Intrusion Detection BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
On the Effectiveness of Techniques to Detect Phishing Sites BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Detecting System Emulators BOOK CHAPTER published in Lecture Notes in Computer Science |
Extending .NET Security to Unmanaged Code BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Leveraging User Interactions for In-Depth Testing of Web Applications BOOK CHAPTER published in Lecture Notes in Computer Science |
Automated Spyware Collection and Analysis BOOK CHAPTER published 2009 in Lecture Notes in Computer Science |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users BOOK CHAPTER published 2015 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Automatically Generating Models for Botnet Detection BOOK CHAPTER published 2009 in Computer Security – ESORICS 2009 |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples BOOK CHAPTER published 2013 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Detection of Intrusions and Malware, and Vulnerability Assessment BOOK published 2005 in Lecture Notes in Computer Science |
Polymorphic Worm Detection Using Structural Information of Executables BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
An Analysis of Malware Trends in Enterprise Networks BOOK CHAPTER published 2019 in Lecture Notes in Computer Science |
Abusing Social Networks for Automated User Profiling BOOK CHAPTER published 2010 in Lecture Notes in Computer Science |
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation BOOK CHAPTER published 2019 in Detection of Intrusions and Malware, and Vulnerability Assessment |
You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures BOOK CHAPTER published 2021 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Malware Detection Based on Static and Dynamic Features Analysis BOOK CHAPTER published 2020 in Machine Learning for Cyber Security |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges BOOK CHAPTER published 2012 in Open Problems in Network Security |
On the Security of Application Installers and Online Software Repositories BOOK CHAPTER published 2020 in Detection of Intrusions and Malware, and Vulnerability Assessment |