ACM SIGCAS Computers and Society
VoIP malware: attack tool & attack scenarios
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Malware detection based on dependency graph using hybrid genetic algorithm
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Towards early warning systems: challenges, technologies and architecture
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Ethical proactive threat research
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
AONT-RS: blending security and performance in dispersed storage systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Hunting for undetectable metamorphic viruses
Journal in Computer Virology
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
Opcode graph similarity and metamorphic detection
Journal in Computer Virology
New malware detection system using metric-based method and hybrid genetic algorithm
Proceedings of the 14th annual conference companion on Genetic and evolutionary computation
Chi-squared distance and metamorphic virus detection
Journal in Computer Virology
Metamorphic worm that carries its own morphing engine
Journal in Computer Virology
Disguised malware script detection system using hybrid genetic algorithm
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Simple substitution distance and metamorphic detection
Journal in Computer Virology
Using agent technologies to correlate and compare anti-malware software
Proceedings of the 2nd annual conference on Research in information technology
Hi-index | 0.00 |