Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             39 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A boosting ensemble for the recognition of code sharing in malware Barr, Stanley J.
2008
4 p. 335-345
artikel
2 ACPI and SMI handlers: some limits to trusted computing Duflot, Loïc
2009
4 p. 353-374
artikel
3 An intelligent PE-malware detection system based on association mining Ye, Yanfang
2008
4 p. 323-334
artikel
4 Anti-virtual machines and emulations Issa, Anoirel
2012
4 p. 141-149
artikel
5 A practical approach on clustering malicious PDF documents Vatamanu, Cristina
2012
4 p. 151-163
artikel
6 Classification of packet contents for malware detection Ahmed, Irfan
2011
4 p. 279-295
artikel
7 Comparing files using structural entropy Sorokin, Ivan
2011
4 p. 259-265
artikel
8 Constructing malware normalizers using term rewriting Walenstein, Andrew
2008
4 p. 307-322
artikel
9 Danger theory and collaborative filtering in MANETs Hoffman, Katherine
2008
4 p. 345-355
artikel
10 Developing a Trojan applets in a smart card Iguchi-Cartigny, Julien
2009
4 p. 343-351
artikel
11 Evaluation of malware phylogeny modelling systems using automated variant generation Hayes, Matthew
2008
4 p. 335-343
artikel
12 Foreword Filiol, E.
2007
4 p. 241-242
artikel
13 Formal affordance-based models of computer virus reproduction Webster, Matt
2008
4 p. 289-306
artikel
14 Graph-based malware detection using dynamic analysis Anderson, Blake
2011
4 p. 247-258
artikel
15 IDS alerts correlation using grammar-based approach Al-Mamory, Safaa O.
2008
4 p. 271-282
artikel
16 Improving security and performance of an Ad Hoc network through a multipath routing strategy Aiache, Hervé
2008
4 p. 267-278
artikel
17 IpMorph: fingerprinting spoofing unification Prigent, Guillaume
2009
4 p. 329-342
artikel
18 Language models for detection of unknown attacks in network traffic Rieck, Konrad
2006
4 p. 243-256
artikel
19 Malicious origami in PDF Raynal, Frédéric
2009
4 p. 289-315
artikel
20 Malware behaviour analysis Wagener, Gérard
2007
4 p. 279-287
artikel
21 Malware classification based on call graph clustering Kinable, Joris
2011
4 p. 233-245
artikel
22 Network-level polymorphic shellcode detection using emulation Polychronakis, Michalis
2006
4 p. 257-274
artikel
23 On callgraphs and generative mechanisms Bilar, Daniel
2007
4 p. 299-310
artikel
24 On callgraphs and generative mechanisms Bilar, Daniel
2007
4 p. 285-297
artikel
25 On the defence notion Bonfante, Anne
2007
4 p. 247-251
artikel
26 On the trade-off between speed and resiliency of Flash worms and similar malcodes Ha, Duc T.
2009
4 p. 309-320
artikel
27 Practical overview of a Xen covert channel Salaün, Mickaël
2009
4 p. 317-328
artikel
28 Referees 2006 2006
4 p. 291
artikel
29 Run-time malware detection based on positive selection Fuyong, Zhang
2011
4 p. 267-277
artikel
30 SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging Ye, Yanfang
2008
4 p. 283-293
artikel
31 Software transformations to improve malware detection Christodorescu, Mihai
2007
4 p. 253-265
artikel
32 SQL infections through RFID Sulaiman, Anthonius
2007
4 p. 347-356
artikel
33 Symbian worm Yxes: towards mobile botnets? Apvrille, Axelle
2012
4 p. 117-131
artikel
34 TAMAP: a new trust-based approach for mobile agent protection Hacini, Salima
2007
4 p. 267-283
artikel
35 The proactivity of Perceptron derived algorithms in malware detection Cimpoeşu, Mihai
2012
4 p. 133-140
artikel
36 Treating scalability and modelling human countermeasures against local preference worms via gradient models Avlonitis, Markos
2008
4 p. 357-364
artikel
37 Unknown malcode detection and the imbalance problem Moskovitch, Robert
2009
4 p. 295-308
artikel
38 Using a virtual security testbed for digital forensic reconstruction Årnes, André
2006
4 p. 275-289
artikel
39 White-box attack context cryptovirology Josse, Sébastien
2008
4 p. 321-334
artikel
                             39 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland