nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A boosting ensemble for the recognition of code sharing in malware
|
Barr, Stanley J. |
|
2008 |
|
4 |
p. 335-345 |
artikel |
2 |
ACPI and SMI handlers: some limits to trusted computing
|
Duflot, Loïc |
|
2009 |
|
4 |
p. 353-374 |
artikel |
3 |
An intelligent PE-malware detection system based on association mining
|
Ye, Yanfang |
|
2008 |
|
4 |
p. 323-334 |
artikel |
4 |
Anti-virtual machines and emulations
|
Issa, Anoirel |
|
2012 |
|
4 |
p. 141-149 |
artikel |
5 |
A practical approach on clustering malicious PDF documents
|
Vatamanu, Cristina |
|
2012 |
|
4 |
p. 151-163 |
artikel |
6 |
Classification of packet contents for malware detection
|
Ahmed, Irfan |
|
2011 |
|
4 |
p. 279-295 |
artikel |
7 |
Comparing files using structural entropy
|
Sorokin, Ivan |
|
2011 |
|
4 |
p. 259-265 |
artikel |
8 |
Constructing malware normalizers using term rewriting
|
Walenstein, Andrew |
|
2008 |
|
4 |
p. 307-322 |
artikel |
9 |
Danger theory and collaborative filtering in MANETs
|
Hoffman, Katherine |
|
2008 |
|
4 |
p. 345-355 |
artikel |
10 |
Developing a Trojan applets in a smart card
|
Iguchi-Cartigny, Julien |
|
2009 |
|
4 |
p. 343-351 |
artikel |
11 |
Evaluation of malware phylogeny modelling systems using automated variant generation
|
Hayes, Matthew |
|
2008 |
|
4 |
p. 335-343 |
artikel |
12 |
Foreword
|
Filiol, E. |
|
2007 |
|
4 |
p. 241-242 |
artikel |
13 |
Formal affordance-based models of computer virus reproduction
|
Webster, Matt |
|
2008 |
|
4 |
p. 289-306 |
artikel |
14 |
Graph-based malware detection using dynamic analysis
|
Anderson, Blake |
|
2011 |
|
4 |
p. 247-258 |
artikel |
15 |
IDS alerts correlation using grammar-based approach
|
Al-Mamory, Safaa O. |
|
2008 |
|
4 |
p. 271-282 |
artikel |
16 |
Improving security and performance of an Ad Hoc network through a multipath routing strategy
|
Aiache, Hervé |
|
2008 |
|
4 |
p. 267-278 |
artikel |
17 |
IpMorph: fingerprinting spoofing unification
|
Prigent, Guillaume |
|
2009 |
|
4 |
p. 329-342 |
artikel |
18 |
Language models for detection of unknown attacks in network traffic
|
Rieck, Konrad |
|
2006 |
|
4 |
p. 243-256 |
artikel |
19 |
Malicious origami in PDF
|
Raynal, Frédéric |
|
2009 |
|
4 |
p. 289-315 |
artikel |
20 |
Malware behaviour analysis
|
Wagener, Gérard |
|
2007 |
|
4 |
p. 279-287 |
artikel |
21 |
Malware classification based on call graph clustering
|
Kinable, Joris |
|
2011 |
|
4 |
p. 233-245 |
artikel |
22 |
Network-level polymorphic shellcode detection using emulation
|
Polychronakis, Michalis |
|
2006 |
|
4 |
p. 257-274 |
artikel |
23 |
On callgraphs and generative mechanisms
|
Bilar, Daniel |
|
2007 |
|
4 |
p. 299-310 |
artikel |
24 |
On callgraphs and generative mechanisms
|
Bilar, Daniel |
|
2007 |
|
4 |
p. 285-297 |
artikel |
25 |
On the defence notion
|
Bonfante, Anne |
|
2007 |
|
4 |
p. 247-251 |
artikel |
26 |
On the trade-off between speed and resiliency of Flash worms and similar malcodes
|
Ha, Duc T. |
|
2009 |
|
4 |
p. 309-320 |
artikel |
27 |
Practical overview of a Xen covert channel
|
Salaün, Mickaël |
|
2009 |
|
4 |
p. 317-328 |
artikel |
28 |
Referees 2006
|
|
|
2006 |
|
4 |
p. 291 |
artikel |
29 |
Run-time malware detection based on positive selection
|
Fuyong, Zhang |
|
2011 |
|
4 |
p. 267-277 |
artikel |
30 |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging
|
Ye, Yanfang |
|
2008 |
|
4 |
p. 283-293 |
artikel |
31 |
Software transformations to improve malware detection
|
Christodorescu, Mihai |
|
2007 |
|
4 |
p. 253-265 |
artikel |
32 |
SQL infections through RFID
|
Sulaiman, Anthonius |
|
2007 |
|
4 |
p. 347-356 |
artikel |
33 |
Symbian worm Yxes: towards mobile botnets?
|
Apvrille, Axelle |
|
2012 |
|
4 |
p. 117-131 |
artikel |
34 |
TAMAP: a new trust-based approach for mobile agent protection
|
Hacini, Salima |
|
2007 |
|
4 |
p. 267-283 |
artikel |
35 |
The proactivity of Perceptron derived algorithms in malware detection
|
Cimpoeşu, Mihai |
|
2012 |
|
4 |
p. 133-140 |
artikel |
36 |
Treating scalability and modelling human countermeasures against local preference worms via gradient models
|
Avlonitis, Markos |
|
2008 |
|
4 |
p. 357-364 |
artikel |
37 |
Unknown malcode detection and the imbalance problem
|
Moskovitch, Robert |
|
2009 |
|
4 |
p. 295-308 |
artikel |
38 |
Using a virtual security testbed for digital forensic reconstruction
|
Årnes, André |
|
2006 |
|
4 |
p. 275-289 |
artikel |
39 |
White-box attack context cryptovirology
|
Josse, Sébastien |
|
2008 |
|
4 |
p. 321-334 |
artikel |