Malware detection module using machine learning algorithms to assist in centralized security in enterprise networks

P Singhal, N Raul - arXiv preprint arXiv:1205.3062, 2012 - arxiv.org
Malicious software is abundant in a world of innumerable computer users, who are
constantly faced with these threats from various sources like the internet, local networks and …

[PDF][PDF] Windows api based malware detection and framework analysis

R Veeramani, N Rai - International conference on networks and cyber …, 2012 - Citeseer
Detection of zero day malware has been the great challenge for researchers from long time.
Traditional signature based antimalware scanners detect malware based on their unique …

Randomizing smartphone malware profiles against statistical mining techniques

A Shastry, M Kantarcioglu, Y Zhou… - Data and Applications …, 2012 - Springer
The growing use of smartphones opens up new opportunities for malware activities such as
eavesdropping on phone calls, reading e-mail and call-logs, and tracking callers' locations …

IAAS an integrity assurance service for web page via a fragile watermarking chain module

P Gao, H Han, T Tokuda - … of the 6th International Conference on …, 2012 - dl.acm.org
As the main facial point of the Web-based e-commerce which is frequently considered as a
most important application area of Internet, Web page has been being given more and more …

[PDF][PDF] On the Automatic Detection of Embedded Malicious Binary Code using Signal Processing Techniques Project Report

B Jochheim - Hamburg, October, 2012 - inet.haw-hamburg.de
This project report examines a lightweight method to detect binary instruction code, possibly
embedded within regular data, as suggested in [1] and demonstrated at SIGCOMM 2012 …

Web‐Based Vulnerabilities

AK Ghosh, K Baumgarten, J Hadley… - Computer Security …, 2012 - Wiley Online Library
This chapter reviews the primary software components that make up Web applications, with
a primary focus on e‐commerce. It provides an overview of the risks to each of these …

Métodos Formais Algébricos para Geraçao de Invariantes

R Rebiha, AV Moura - Concurso de Teses e Dissertações (CTD), 2012 - sol.sbc.org.br
É bem sabido que a eficácia de métodos de verificação formal de sistemas embarcados, ou
sistemas híbridos, depende da geração automática e eficiente de invariantes precisas …

[图书][B] An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares

SM Abdulla - 2012 - search.proquest.com
Recently, most researchers have employed behaviour based detection systems to classify
Portable Executable (PE) malwares. They usually tried to identify malicious Application …

[引用][C] 一种文件安全度的评估方案系统设计

张尚韬 - 广东石油化工学院学报, 2012