


default search action
4th MALWARE 2009: Quebec, Canada
- 4th International Conference on Malicious and Unwanted Software, MALWARE 2009, Montréal, Quebec, Canada, October 13-14, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5787-8

- Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe

, Sahin Albayrak
, Can Yildizli:
Smartphone malware evolution revisited: Android next target? 1-7 - Mohammad Reza Faghani, Hossein Saidi

:
Malware propagation in Online Social Networks. 8-14 - Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe

, Sahin Albayrak
:
Detecting Symbian OS malware through static function call analysis. 15-22 - Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam, Steven Versteeg:

An automated classification system based on the strings of trojan and virus families. 23-30 - Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini:

Nebula - generating syntactical network intrusion signatures. 31-38 - Felix Leder, Bastian Steinbock, Peter Martini:

Classification and detection of metamorphic malware using value set analysis. 39-46 - Peter Likarish, Eunjin Jung, Insoon Jo:

Obfuscated malicious javascript detection using classification techniques. 47-54 - Wadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey:

Server-side dynamic code analysis. 55-62 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:

Malware analysis with graph kernels and support vector machines. 63-68 - Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang:

The waledac protocol: The how and why. 69-77 - Carlton R. Davis, José M. Fernandez

, Stephen Neville:
Optimising sybil attacks against P2P-based botnets. 78-87 - Joan Calvet, Carlton R. Davis, Pierre-Marc Bureau:

Malware authors don't learn, and that's good! 88-97 - Jose Andre Morales

, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing DNS activities of bot processes. 98-103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














