Sciweavers

109 search results - page 10 / 22
» Using IRP for Malware Detection
Sort
View
93
Voted
ICC
2008
IEEE
15 years 11 months ago
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic
Sohraab Soltani, Syed A. Khayam, Hayder Radha
109
Voted
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
15 years 7 months ago
Malware detection based on dependency graph using hybrid genetic algorithm
Keehyung Kim, Byung Ro Moon
ASPLOS
2006
ACM
15 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
RAID
2010
Springer
15 years 3 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...