A Classification of Viruses Through Recursion Theorems
CiE '07 Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World
Symptoms-based detection of bot processes
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Enforcing kernel constraints by hardware-assisted virtualization
Journal in Computer Virology
A new N-gram feature extraction-selection method for malicious code
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Combining file content and file relations for cloud based malware detection
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Malware: from modelling to practical detection
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
MalPEFinder: fast and retrospective assessment of data breaches in malware attacks
Security and Communication Networks
Security and protection of SCADA: a bigdata algorithmic approach
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |