default search action
4th MALWARE 2009: Quebec, Canada
- 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5787-8
- Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak, Can Yildizli:
Smartphone malware evolution revisited: Android next target? 1-7 - Mohammad Reza Faghani, Hossein Saidi:
Malware propagation in Online Social Networks. 8-14 - Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak:
Detecting Symbian OS malware through static function call analysis. 15-22 - Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam, Steven Versteeg:
An automated classification system based on the strings of trojan and virus families. 23-30 - Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini:
Nebula - generating syntactical network intrusion signatures. 31-38 - Felix Leder, Bastian Steinbock, Peter Martini:
Classification and detection of metamorphic malware using value set analysis. 39-46 - Peter Likarish, Eunjin Jung, Insoon Jo:
Obfuscated malicious javascript detection using classification techniques. 47-54 - Wadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey:
Server-side dynamic code analysis. 55-62 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Malware analysis with graph kernels and support vector machines. 63-68 - Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang:
The waledac protocol: The how and why. 69-77 - Carlton R. Davis, José M. Fernandez, Stephen Neville:
Optimising sybil attacks against P2P-based botnets. 78-87 - Joan Calvet, Carlton R. Davis, Pierre-Marc Bureau:
Malware authors don't learn, and that's good! 88-97 - Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing DNS activities of bot processes. 98-103
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.