The best expert versus the smartest algorithm
Theoretical Computer Science - Special issue: Online algorithms in memoriam, Steve Seiden
NetSpy: Automatic Generation of Spyware Signatures for NIDS
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Mining specifications of malicious behavior
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
A semantics-based approach to malware detection
ACM Transactions on Programming Languages and Systems (TOPLAS)
HACKING EXPOSED MALWARE AND ROOTKITS
HACKING EXPOSED MALWARE AND ROOTKITS
Transforms of pseudo-Boolean random variables
Discrete Applied Mathematics
Automated classification and analysis of internet malware
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Local soft belief updating for relational classification
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
Overview of papers in 2006 active conceptual modeling of learning (ACM-L) workshop
Active conceptual modeling of learning
Cyber War: The Next Threat to National Security and What to Do About It
Cyber War: The Next Threat to National Security and What to Do About It
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Efficient learning of pseudo-boolean functions from limited training data
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
Hi-index | 0.00 |