Malware DetectionPub Date : 1900-01-01DOI: 10.1007/978-0-387-44599-1_1
Brian Witten, Carey Nachenberg
{"title":"Malware Evolution: A Snapshot of Threats and Countermeasures in 2005","authors":"Brian Witten, Carey Nachenberg","doi":"10.1007/978-0-387-44599-1_1","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_1","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malware DetectionPub Date : 1900-01-01DOI: 10.1007/978-0-387-44599-1_13
Geoffrey Smith
{"title":"Principles of Secure Information Flow Analysis","authors":"Geoffrey Smith","doi":"10.1007/978-0-387-44599-1_13","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_13","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malware DetectionPub Date : 1900-01-01DOI: 10.1007/978-0-387-44599-1_5
William G. J. Halfond, A. Orso
{"title":"Detection and Prevention of SQL Injection Attacks","authors":"William G. J. Halfond, A. Orso","doi":"10.1007/978-0-387-44599-1_5","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_5","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malware DetectionPub Date : 1900-01-01DOI: 10.1007/978-0-387-44599-1_6
N. Weaver, Stuart Staniford-Chen, V. Paxson
{"title":"Very Fast Containment of Scanning Worms, Revisited","authors":"N. Weaver, Stuart Staniford-Chen, V. Paxson","doi":"10.1007/978-0-387-44599-1_6","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_6","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malware DetectionPub Date : 1900-01-01DOI: 10.1007/978-0-387-44599-1_10
Stelios Sidiroglou, A. Keromytis
{"title":"Composite Hybrid Techniques For Defending Against Targeted Attacks","authors":"Stelios Sidiroglou, A. Keromytis","doi":"10.1007/978-0-387-44599-1_10","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_10","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}