Affiliation:
1. The Open University of Israel Raanana Israel
2. Ben‐Gurion University Beer‐Sheva Israel
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference32 articles.
1. A sense of self for Unix processes
2. SomayajiA ForrestS.Automated response using system‐call delays.Proceedings of the 9th USENIX Security Symposium Denver Colorado USA;2000:185–198.
3. WarrenderC ForrestS PearlmutterB.Detecting intrusions using system calls: alternative data models.Proceedings of the 1999 IEEE Symposium on Security and Privacy Oakland California USA;1999:133–145.
4. SchultzM EskinE ZadokE StolfoS.Data mining methods for detection of new malicious executables.Proceedings of the IEEE Symposium on Security and Privacy Oakland California USA;2001:38–49.
5. KolterJZ MaloofMA.Learning to detect malicious executables in the wild.Proceedings of the 10th International Conference on Knowledge Discovery and Data Mining Seattle Washington USA;2004:470–478.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献