Computer viruses: theory and experiments
Computers and Security
The application of epidemiology to computer viruses
Computers and Security
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Introduction to the theory of neural computation
Introduction to the theory of neural computation
Learning internal representations by error propagation
Parallel distributed processing: explorations in the microstructure of cognition, vol. 1
IEEE Spectrum
Text algorithms
Computer Virus Handbook
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Communications of the ACM
The string B-tree: a new data structure for string search in external memory and its applications
Journal of the ACM (JACM)
Combating computer viruses: IBM's new computer immune system
IEEE Parallel & Distributed Technology: Systems & Technology
IEEE Intelligent Systems
Neural networks in real-world applications
IEEE Expert: Intelligent Systems and Their Applications
Complexity - Special issue: Resilient and adaptive defense of computing networks
Learning to detect malicious executables in the wild
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Learning to Detect and Classify Malicious Executables in the Wild
The Journal of Machine Learning Research
Malware detection using adaptive data compression
Proceedings of the 1st ACM workshop on Workshop on AISec
Agent-based modeling of host-pathogen systems: The successes and challenges
Information Sciences: an International Journal
Proceedings of the 47th Annual Southeast Regional Conference
Proceedings of the 2008 workshop on New security paradigms
Malware detection using statistical analysis of byte-level file content
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Proceedings of the 48th Annual Southeast Regional Conference
Pattern recognition techniques for the classification of malware packers
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Determining malicious executable distinguishing attributes and low-complexity detection
Journal in Computer Virology
Using randomized projection techniques to aid in detecting high-dimensional malicious applications
Proceedings of the 49th Annual Southeast Regional Conference
New malicious code detection using variable length n-grams
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Proceedings of the 50th Annual Southeast Regional Conference
Using low-level dynamic attributes for malware detection based on data mining methods
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.02 |
Today's anti-virus technology, based largely on analysis of existing viruses by human experts, is just barely able to keep pace with the more than three new computer viruses that are written daily. In a few years, intelligent agents navigating through highly connected networks are likely to form an extremely fertile medium for a new breed of viruses. At IBM, we are developing novel, biologically inspired antivirus techniques designed to thwart both today's and tomorrow's viruses. Here we describe two of these: a neural network virus detector that learns to discriminate between infected and uninfected programs, and a computer immune system that identifies new viruses, analyzes them automatically, and uses the results of its analysis to detect and remove all copies of the virus that are present in the system. The neural-net technology has been incorporated into IBM's commercial anti-virus product; the computer immune system is in prototype.