AV-Meter: An Evaluation of Antivirus Scans and Labels
暂无分享,去创建一个
[1] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[2] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[3] Guanhua Yan,et al. Discriminant malware distance learning on structural information for automated malware classification , 2013, SIGMETRICS.
[4] Sonia Chiasson,et al. A clinical study of risk factors related to malware infections , 2013, CCS.
[5] Aziz Mohaisen,et al. Unveiling Zeus: automated classification of malware samples , 2013, WWW.
[6] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[7] Olivier Thonnard,et al. An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[8] Douglas S. Reeves,et al. Fast malware classification by automated behavioral graph matching , 2010, CSIIRW '10.
[9] Steve Lipner,et al. Security development lifecycle , 2010, Datenschutz und Datensicherheit - DuD.
[10] Stefano Zanero,et al. Finding Non-trivial Malware Naming Inconsistencies , 2011, ICISS.
[11] Joris Kinable,et al. Malware classification based on call graph clustering , 2010, Journal in Computer Virology.
[12] Recep Benzer,et al. Advanced persistent threats , 2016, 2016 24th Signal Processing and Communication Application Conference (SIU).
[13] Jingjing Yao,et al. Malicious Executables Classification Based on Behavioral Factor Analysis , 2010, 2010 International Conference on e-Education, e-Business, e-Management and e-Learning.
[14] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[15] Aziz Mohaisen,et al. AMAL: High-fidelity, behavior-based automated malware analysis and classification , 2014, Comput. Secur..
[16] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[17] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[18] Aziz Mohaisen,et al. Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware , 2014, DIMVA.
[19] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[20] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[21] Lynn Margaret Batten,et al. Function length as a tool for malware classification , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[22] Roberto Perdisci,et al. VAMO: towards a fully automated malware clustering validity analysis , 2012, ACSAC '12.
[23] Julio Canto,et al. Large scale malware collection : lessons learned , 2008 .
[24] Herbert Bos,et al. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[26] W. Timothy Strayer,et al. Botnet Detection Based on Network Behavior , 2008, Botnet Detection.
[27] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[28] Guanhua Yan,et al. Exploring Discriminatory Features for Automated Malware Classification , 2013, DIMVA.
[29] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.