A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Current security management & Ethical issues of information technology
Didactic strategies for promoting significant learning in formal languages and automata theory
Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education
A Method for Detecting Obfuscated Calls in Malicious Binaries
IEEE Transactions on Software Engineering
An analysis of how antivirus methodologies are utilized in protecting computers from malicious code
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Computability classes for enforcement mechanisms
ACM Transactions on Programming Languages and Systems (TOPLAS)
Puppetnets: misusing web browsers as a distributed attack infrastructure
Proceedings of the 13th ACM conference on Computer and communications security
A semantics-based approach to malware detection
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Mining specifications of malicious behavior
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Mining specifications of malicious behavior
ISEC '08 Proceedings of the 1st India software engineering conference
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
A semantics-based approach to malware detection
ACM Transactions on Programming Languages and Systems (TOPLAS)
Computer Virus Evolution Model Inspired by Biological DNA
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
ACM Transactions on Information and System Security (TISSEC)
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Expert Systems with Applications: An International Journal
Hardening Botnet by a Rational Botmaster
Information Security and Cryptology
Exploiting an antivirus interface
Computer Standards & Interfaces
Detecting metamorphic malwares using code graphs
Proceedings of the 2010 ACM Symposium on Applied Computing
UPBOT: a testbed for cyber-physical systems
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Inoculation against malware infection using kernel-level software sensors
Proceedings of the 8th ACM international conference on Autonomic computing
Core technology analysis and development for the virus and hacking prevention
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Detection methods for executive compressed malicious codes in wire/wireless networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Tracking concept drift in malware families
Proceedings of the 5th ACM workshop on Security and artificial intelligence
How secure are power network signature based time stamps?
Proceedings of the 2012 ACM conference on Computer and communications security
Covert computation: hiding code in code for obfuscation purposes
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 48.22 |