Author:
Wang Ke,Cretu Gabriela,Stolfo Salvatore J.
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Bhatkar, S., DuVarney, D.C., Sekar, R.: Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. In: 12th USENIX Security Symposium (2003)
2. Damashek, M.: Gauging similarity with n-grams: language independent categorization of text. Science 267(5199), 843–848 (1995)
3. Gusfield, D.: Algorithms on Strings, Trees and Sequences. Cambridge University Press, Cambridge (1997)
4. Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Processing of the 4th International Virus Bulletin Conference (September 1994)
5. Kim, K.-A., Karp, B.: Autograph: Toward Automated Distributed Worm Distribution. In: Proceedings of the USENIX Security Symposium (August 2004)
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献