Author:
Buyukkayhan Ahmet Salih,Oprea Alina,Li Zhou,Robertson William
Publisher
Springer International Publishing
Reference40 articles.
1. Lecture Notes in Computer Science;M Bailey,2007
2. Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: Proceedings of Network and Distributed System Security Symposium, NDSS, vol. 9, pp. 8–11 (2009)
3. Bianchi, A., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Blacksheep: detecting compromised hosts in homogeneous crowds. In: Proceedings of ACM Conference on Computer and Communications Security, CCS, pp. 341–352. ACM (2012)
4. Lecture Notes in Computer Science;KD Bowers,2014
5. Canali, D., Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: A quantitative study of accuracy in system call-based malware detection. In: Proceedings of International Symposium on Software Testing and Analysis, pp. 122–132. ACM (2012)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Unsupervised Detection and Clustering of Malicious TLS Flows;Security and Communication Networks;2023-01-12
2. VaultBox: Enhancing the Security and Effectiveness of Security Analytics;Science of Cyber Security;2023
3. A Deep Dive into the VirusTotal File Feed;Detection of Intrusions and Malware, and Vulnerability Assessment;2023
4. Research and Implementation of Host Behavior Anomaly Detection Technology Based on Deep Learning;2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2022-05-04
5. EIGER;Proceedings of the 35th Annual Computer Security Applications Conference;2019-12-09