


default search action
6th MALWARE 2011: Fajardo, PR, USA
- 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0033-9

- Anshuman Singh, Arun Lakhotia:

Game-theoretic design of an information exchange model for detecting packed malware. 1-7 - Marco Ramilli, Matt Bishop

, Shining Sun:
Multiprocess malware. 8-13 - Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani:

Exploring network-based malware classification. 14-20 - Ferenc Leitold:

Testing protections against web threats. 20-26 - Vikram Phatak, Rick Moy:

Evaluating security products based on appropriate usage. 27-33 - Rodrigo Rubira Branco, Gabriel Negreira Barbosa:

Distributed malware analysis scheduling. 34-41 - Matt Bishop

, Richard Ford, Marco Ramilli:
Results-oriented security. 42-49 - Jose Andre Morales

, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu:
Building malware infection trees. 50-57 - Michalis Polychronakis, Angelos D. Keromytis:

ROP payload detection using speculative code execution. 58-65 - Leonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe

, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak
:
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. 66-72 - Mark Balanza, Kervin Alintanahin, Oscar Abendan, Julius Dizon, Bernadette Caraig:

DroidDreamLight lurks behind legitimate Android apps. 73-78 - Dong-Hoon You, Bong-Nam Noh:

Android platform based linux kernel rootkit. 79-87 - Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez:

Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks. 88-94 - Hugo Gonzalez-Robledo

, Kara Nance, Jose Nazario:
Phishing by form: The abuse of form sites. 95-101 - Frankie Li, Anthony Lai, DDL:

Evidence of Advanced Persistent Threat: A case study of malware for political espionage. 102-109 - Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui:

A recoverable hybrid C&C botnet. 110-118

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














