Malware Detection最新文献

筛选
英文 中文
Static Disassembly and Code Analysis 静态反汇编和代码分析
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_2
G. Vigna
{"title":"Static Disassembly and Code Analysis","authors":"G. Vigna","doi":"10.1007/978-0-387-44599-1_2","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_2","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 恶意软件的演变:2005年威胁和对策的快照
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_1
Brian Witten, Carey Nachenberg
{"title":"Malware Evolution: A Snapshot of Threats and Countermeasures in 2005","authors":"Brian Witten, Carey Nachenberg","doi":"10.1007/978-0-387-44599-1_1","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_1","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Principles of Secure Information Flow Analysis 安全信息流分析原理
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_13
Geoffrey Smith
{"title":"Principles of Secure Information Flow Analysis","authors":"Geoffrey Smith","doi":"10.1007/978-0-387-44599-1_13","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_13","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
An Inside Look at Botnets 僵尸网络的内部观察
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_8
P. Barford, V. Yegneswaran
{"title":"An Inside Look at Botnets","authors":"P. Barford, V. Yegneswaran","doi":"10.1007/978-0-387-44599-1_8","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_8","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 371
Detection and Prevention of SQL Injection Attacks SQL注入攻击的检测与预防
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_5
William G. J. Halfond, A. Orso
{"title":"Detection and Prevention of SQL Injection Attacks","authors":"William G. J. Halfond, A. Orso","doi":"10.1007/978-0-387-44599-1_5","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_5","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Behavioral and Structural Properties of Malicious Code 恶意代码的行为和结构特性
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_4
Christopher Krügel
{"title":"Behavioral and Structural Properties of Malicious Code","authors":"Christopher Krügel","doi":"10.1007/978-0-387-44599-1_4","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_4","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Very Fast Containment of Scanning Worms, Revisited 快速遏制扫描蠕虫,重访
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_6
N. Weaver, Stuart Staniford-Chen, V. Paxson
{"title":"Very Fast Containment of Scanning Worms, Revisited","authors":"N. Weaver, Stuart Staniford-Chen, V. Paxson","doi":"10.1007/978-0-387-44599-1_6","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_6","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards Stealthy Malware Detection 走向隐蔽的恶意软件检测
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_11
S. Stolfo, Ke Wang, Wei-Jen Li
{"title":"Towards Stealthy Malware Detection","authors":"S. Stolfo, Ke Wang, Wei-Jen Li","doi":"10.1007/978-0-387-44599-1_11","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_11","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124633262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? 协作入侵探测器能否挑战基本率谬论?
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_9
Mihai Christodorescu, Shai Rubin
{"title":"Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?","authors":"Mihai Christodorescu, Shai Rubin","doi":"10.1007/978-0-387-44599-1_9","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_9","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Composite Hybrid Techniques For Defending Against Targeted Attacks 防御目标攻击的复合混合技术
Malware Detection Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-44599-1_10
Stelios Sidiroglou, A. Keromytis
{"title":"Composite Hybrid Techniques For Defending Against Targeted Attacks","authors":"Stelios Sidiroglou, A. Keromytis","doi":"10.1007/978-0-387-44599-1_10","DOIUrl":"https://doi.org/10.1007/978-0-387-44599-1_10","url":null,"abstract":"","PeriodicalId":181639,"journal":{"name":"Malware Detection","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信