Author:
Kaur Ratinder,Singh Maninder
Publisher
Springer International Publishing
Reference25 articles.
1. Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 833–844. ACM Press, New York (2012)
2. Symantec’s Internet Threat Report of 2013.
https://scm.symantec.com/resources/istr18_en.pdf
3. Mohammed, M.M.Z.E., Chan, H.A., Ventura, N.: Honeycyber: automated signature generation for zero-day polymorphic worms. In: Proceedings of the IEEE Military Communications Conference (MILCOM 2008), pp. 1–6. IEEE Computer Society, Washington (2008)
4. Mohammed, M.M.Z.E., Chan, H.A., Ventura, N., Hashim, M., Amin, I., Bashier, E.: Detection of zero-day polymorphic worms using principal component analysis. In: Proceedings of the 6th IEEE International Conference on Networking and Services, pp. 277–281. IEEE Computer Society, Washington (2010)
5. Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 226–241. IEEE Press, New York (2005)