Author:
Fredrikson Matt,Christodorescu Mihai,Giffin Jonathon,Jhas Somesh
Reference52 articles.
1. Bancilhon, F., Ramakrishnan, R.: An amateur’s introduction to recursive query processing strategies. In: Proceedings of the 1986 ACM SIGMOD international conference on Management of data, pp. 16–52. ACM, New York, NY, USA (1986)
2. Bhatkar, S., Chaturvedi, A., Sekar, R.: Dataflow anomaly detection. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 48–62. IEEE Computer Society, Washington, DC, USA (2006)
3. Brewer, E.A.: Combining Systems and Databases: A Search Engine Retrospective, pp. 711–724. MIT Press (2005)
4. Buchholz, F.P., Shields, C.: Providing process origin information to aid in computer forensic investigations. Journal of Computer Security 12(5), 753–776 (2004)
5. Burtscher, M.: VPC3: a fast and effective trace-compression algorithm. In: Proceedings of the joint international conference on Measurement and modeling of computer systems, pp. 167–176. ACM, New York, NY, USA (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29
2. Lprov;Proceedings of the 34th Annual Computer Security Applications Conference;2018-12-03
3. Malware detection with quantitative data flow graphs;Proceedings of the 9th ACM symposium on Information, computer and communications security;2014-06-04