Graph-based malware detection using dynamic analysis | 2011/06/08 | English | 91 |
On the definition and classification of cybercrime | 2006/07/25 | English | 84 |
Hunting for metamorphic engines | 2006/11/11 | English | 83 |
Dynamic Analysis of Malicious Code | 2006/05/16 | English | 72 |
Behavioral detection of malware: from a survey towards an established taxonomy | 2008/02/21 | English | 64 |
Code obfuscation techniques for metamorphic viruses | 2008/02/21 | English | 57 |
Hunting for undetectable metamorphic viruses | 2010/12/25 | English | 54 |
An intelligent PE-malware detection system based on association mining | 2008/02/05 | English | 53 |
Opcode graph similarity and metamorphic detection | 2012/04/03 | English | 53 |
Malware phylogeny generation using permutations of code | 2005/09/20 | English | 52 |
Malware classification based on call graph clustering | 2011/02/03 | English | 52 |
Comparative analysis of various ransomware virii | 2008/07/04 | English | 51 |
N-gram analysis for computer virus detection | 2006/11/08 | English | 39 |
Malware detection using assembly and API call sequences | 2010/04/03 | English | 36 |
Profile hidden Markov models and metamorphic virus detection | 2008/09/10 | English | 36 |
Comparing files using structural entropy | 2011/06/08 | English | 33 |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis | 2006/05/16 | English | 32 |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging | 2008/11/26 | English | 28 |
Shadow attacks: automatically evading system-call-behavior based malware detection | 2011/12/20 | English | 28 |
Unknown malcode detection and the imbalance problem | 2009/07/11 | English | 23 |
Language models for detection of unknown attacks in network traffic | 2006/12/19 | English | 22 |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies | 2006/10/19 | English | 21 |
A general definition of malware | 2009/09/29 | English | 20 |
Reducing the window of opportunity for Android malware Gotta catch ’em all | 2012/04/26 | English | 19 |
Malware behaviour analysis | 2007/12/08 | English | 19 |
A statistical model for undecidable viral detection | 2007/04/04 | English | 17 |
A practical approach on clustering malicious PDF documents | 2012/06/15 | English | 17 |
IDS alerts correlation using grammar-based approach | 2008/08/15 | English | 14 |
Enhancing web browser security against malware extensions | 2008/01/12 | English | 14 |
Usability evaluation of anti-phishing toolbars | 2007/05/16 | English | 14 |