On Intelligence
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Computing the behavior of malicious code with function extraction technology
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Concurrent Architecture for Automated Malware Classification
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Concordia: a Google for malware
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Hadoop: The Definitive Guide
Differentiating code from data in x86 binaries
ECML PKDD'11 Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part III
Reliable identification of bounded-length viruses is NP-complete
IEEE Transactions on Information Theory
Hi-index | 0.00 |