Defending against viruses and worms
ACM SIGUCCS Newsletter
Biological versus computer viruses
ACM SIGSAC Review
Viruses and worms - What can they do?
ACM SIGSAC Review
An abstract theory of computer viruses (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
Convert distributed processing with computer viruses
CRYPTO '89 Proceedings on Advances in cryptology
A software authentication system for the prevention of computer viruses
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
Cryptography for PC/workstation security
ACM SIGICE Bulletin
Communications of the ACM
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
ISW '99 Proceedings of the Second International Workshop on Information Security
IEEE Security and Privacy
Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Proceedings of the 2003 ACM workshop on Rapid malcode
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Complexity - Special issue: Resilient and adaptive defense of computing networks
Journal of Computing Sciences in Colleges
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection
IEEE Security and Privacy
On the performance of internet worm scanning strategies
Performance Evaluation
Cryptographic hashing for virus localization
Proceedings of the 4th ACM workshop on Recurring malcode
A semantics-based approach to malware detection
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Avfs: an on-access anti-virus file system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Defending against hitlist worms using network address space randomization
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Wireless and Mobile Computing
ACM SIGCAS Computers and Society
Distributed strategic interleaving with load balancing
Future Generation Computer Systems
A semantics-based approach to malware detection
ACM Transactions on Programming Languages and Systems (TOPLAS)
Classification of packed executables for accurate computer virus detection
Pattern Recognition Letters
Signature Generation and Detection of Malware Families
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
To prevent them from entering, provide the keys
International Journal of Information Technology and Management
Improving network intrusion detection through soft computing and natural immunology
ACS'08 Proceedings of the 8th conference on Applied computer scince
WSEAS Transactions on Information Science and Applications
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Static CFG analyzer for metamorphic Malware code
Proceedings of the 2nd international conference on Security of information and networks
Design of effective anti-malware system for mobile industrial devices based on windows CE
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
AHP-based measurement and comparison of harms of computer virus
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Practical uses of virtual machines for protection of sensitive user data
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Detecting metamorphic malwares using code graphs
Proceedings of the 2010 ACM Symposium on Applied Computing
Can we certify systems for freedom from malware
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Ethical proactive threat research
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Web server protection by customized instruction set encoding
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Proceedings of the 26th Annual Computer Security Applications Conference
ACM Transactions on Computational Logic (TOCL)
Behavior abstraction in malware analysis
RV'10 Proceedings of the First international conference on Runtime verification
A game-theoretical approach for finding optimal strategies in a botnet defense model
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
From biological and social network metaphors to coupled bio-social wireless networks
International Journal of Autonomous and Adaptive Communications Systems
A new N-gram feature extraction-selection method for malicious code
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Hunting distributed malware with the κ-calculus
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Hunting for undetectable metamorphic viruses
Journal in Computer Virology
What a webserver can learn from a zebra and what we learned in the process
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
An introduction to program and thread algebra
CiE'06 Proceedings of the Second conference on Computability in Europe: logical Approaches to Computational Barriers
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Malware: from modelling to practical detection
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
An email worm vaccine architecture
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A bypass of cohen's impossibility result
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Toward an abstract computer virology
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Research: Model for network behaviour under viral attack
Computer Communications
Shadow attacks: automatically evading system-call-behavior based malware detection
Journal in Computer Virology
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 6th International Conference on Security of Information and Networks
DroidLegacy: Automated Familial Classification of Android Malware
Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014
Hi-index | 0.03 |