Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "polymorphic worm"
@article{DBLP:journals/ijis/WangYWLBT22, author = {Fangwei Wang and Shaojie Yang and Changguang Wang and Qingru Li and Kehinde O. Babaagba and Zhiyuan Tan}, title = {Toward machine intelligence that learns to fingerprint polymorphic worms in IoT}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7058--7078}, year = {2022}, url = {https://doi.org/10.1002/int.22871}, doi = {10.1002/INT.22871}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/WangYWLBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EskandariSG19, author = {Razieh Eskandari and Mahdi Shajari and Mojtaba Mostafavi Ghahfarokhi}, title = {{ERES:} an extended regular expression signature for polymorphic worm detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {3}, pages = {177--194}, year = {2019}, url = {https://doi.org/10.1007/s11416-019-00330-1}, doi = {10.1007/S11416-019-00330-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/EskandariSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/WangYZW19, author = {Fangwei Wang and Shaojie Yang and Dongmei Zhao and Changguang Wang}, title = {An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment}, booktitle = {2019 International Conference on Networking and Network Applications, NaNA 2019, Daegu, Korea (South), October 10-13, 2019}, pages = {223--228}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NaNA.2019.00047}, doi = {10.1109/NANA.2019.00047}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/WangYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AljawarnehMM16, author = {Shadi A. Aljawarneh and Raja A. Moftah and Abdelsalam M. Maatuk}, title = {Investigations of automatic methods for detecting the polymorphic worms signatures}, journal = {Future Gener. Comput. Syst.}, volume = {60}, pages = {67--77}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.020}, doi = {10.1016/J.FUTURE.2016.01.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AljawarnehMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmarshadMP16, author = {Malak Abdullah I. Almarshad and Mohssen M. Z. E. Mohammed and Al{-}Sakib Khan Pathan}, title = {Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2128}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmarshadMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangW16, author = {Jie Wang and Jie Wu}, editor = {Guojun Wang and Indrakshi Ray and Jose M. Alcaraz Calero and Sabu M. Thampi}, title = {A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10066}, pages = {109--121}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49148-6\_10}, doi = {10.1007/978-3-319-49148-6\_10}, timestamp = {Mon, 05 Feb 2024 20:29:50 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangH15, author = {Jie Wang and Xiaoxian He}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {A Novel Signature Generation Approach for Polymorphic Worms}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, pages = {369--382}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8\_28}, doi = {10.1007/978-3-319-27137-8\_28}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {84--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_6}, doi = {10.1007/978-3-319-31550-8\_6}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VirvilisG14, author = {Nikos Virvilis and Dimitris Gritzalis}, title = {Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks}, journal = {Comput. Secur.}, volume = {42}, pages = {191--192}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.007}, doi = {10.1016/J.COSE.2014.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VirvilisG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KaurS14, author = {Ratinder Kaur and Maninder Singh}, title = {A Survey on Zero-Day Polymorphic Worm Detection Techniques}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {3}, pages = {1520--1549}, year = {2014}, url = {https://doi.org/10.1109/SURV.2014.022714.00160}, doi = {10.1109/SURV.2014.022714.00160}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KaurS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Shahin14a, author = {Ashraf A. Shahin}, title = {Polymorphic Worms Collection in Cloud Computing}, journal = {CoRR}, volume = {abs/1409.1654}, year = {2014}, url = {http://arxiv.org/abs/1409.1654}, eprinttype = {arXiv}, eprint = {1409.1654}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Shahin14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BayogluS12, author = {Burak Bayoglu and Ibrahim Sogukpinar}, title = {Graph based signature classes for detecting polymorphic worms via content analysis}, journal = {Comput. Networks}, volume = {56}, number = {2}, pages = {832--844}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2011.11.007}, doi = {10.1016/J.COMNET.2011.11.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BayogluS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccseit/JabroothP12, author = {A. Uzma Jabrooth and B. Parvathavarthini}, editor = {Natarajan Meghanathan and Michal Wozniak}, title = {Polymorphic worms detection using Extended PolyTree}, booktitle = {The Second International Conference on Computational Science, Engineering and Information Technology, {CCSEIT} '12, Coimbatore, India, October 26-28, 2012}, pages = {532--538}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393216.2393305}, doi = {10.1145/2393216.2393305}, timestamp = {Thu, 07 Nov 2019 15:14:46 +0100}, biburl = {https://dblp.org/rec/conf/ccseit/JabroothP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0132-7}, doi = {10.1007/S10207-011-0132-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangXL11, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Signature Tree Generation for Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {4}, pages = {565--579}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.130}, doi = {10.1109/TC.2010.130}, timestamp = {Sun, 23 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangXL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Bayoglu10, author = {Burak Bayoglu}, title = {Polimorfik solucan sald{\i}r{\i}lar{\i}n{\i}n tespiti (Detection of polymorphic worm attacks)}, school = {Gebze Institute of Technology, Turkey}, year = {2010}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=3vLI6\_FF6t1VxHbmsrWF\_A\&no=EC4WQQtp-WKmkq6XfA4VFw}, timestamp = {Sat, 04 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Bayoglu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Zero-day Polymorphic Worms Detection Using {A} modified Boyer-Moore Algorithm}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {413--418}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammedCVHB10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Eihab Bashier}, title = {Fast and accurate detection for polymorphic worms}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678546/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, editor = {Sushil Jajodia and Jianying Zhou}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {1--19}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_1}, doi = {10.1007/978-3-642-16161-2\_1}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangXL09, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms}, journal = {Comput. Secur.}, volume = {28}, number = {8}, pages = {827--842}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.06.003}, doi = {10.1016/J.COSE.2009.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangXL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SunC09a, author = {Wen{-}Chen Sun and Yi{-}Ming Chen}, title = {A rough set approach for automatic key attributes identification of zero-day polymorphic worms}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {4672--4679}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2008.06.037}, doi = {10.1016/J.ESWA.2008.06.037}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SunC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/StephensonS09, author = {Bradley Stephenson and Biplab Sikdar}, title = {A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {9}, pages = {1289--1296}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.63}, doi = {10.1109/TC.2009.63}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/StephensonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TataraHS09, author = {Kohei Tatara and Yoshiaki Hori and Kouichi Sakurai}, title = {Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {972--977}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.103}, doi = {10.1109/ARES.2009.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TataraHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA09, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {652--657}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 30 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/WangWSC09, author = {Jie Wang and Jianxin Wang and Yu Sheng and Jianer Chen}, title = {Polymorphic Worm Detection Using Signatures Based on Neighborhood Relation}, booktitle = {11th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2009, 25-27 June 2009, Seoul, Korea}, pages = {347--353}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/HPCC.2009.59}, doi = {10.1109/HPCC.2009.59}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/WangWSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWCZ09, author = {Jie Wang and Jianxin Wang and Jianer Chen and Xi Zhang}, title = {An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198721}, doi = {10.1109/ICC.2009.5198721}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangWCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsea/MohammedCVHA09, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, editor = {Kenneth Boness and Jo{\~{a}}o M. Fernandes and Jon G. Hall and Ricardo Jorge Machado and Roy Oberhauser}, title = {Polymorphic Worm Detection Using Double-Honeynet}, booktitle = {The Fourth International Conference on Software Engineering Advances, {ICSEA} 2009, 20-25 September 2009, Porto, Portugal}, pages = {401--406}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICSEA.2009.64}, doi = {10.1109/ICSEA.2009.64}, timestamp = {Wed, 09 Aug 2023 08:39:52 +0200}, biburl = {https://dblp.org/rec/conf/icsea/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedC08, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan}, editor = {Johnson I. Agbinya and Elmarie Biermann and Yskandar Hamam and Ntsibane Ntlatlapa and Keith Ferguson}, title = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet}, booktitle = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/BROADCOM.2008.21}, doi = {10.1109/BROADCOM.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CavallaroLMM08, author = {Lorenzo Cavallaro and Andrea Lanzi and Luca Mayer and Mattia Monga}, editor = {Bart De Win and Seok{-}Won Lee and Mattia Monga}, title = {{LISABETH:} automated content-based signature generator for zero-day polymorphic worms}, booktitle = {Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008}, pages = {41--48}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1370905.1370911}, doi = {10.1145/1370905.1370911}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/CavallaroLMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/TataraHS08, author = {Kohei Tatara and Yoshiaki Hori and Kouichi Sakurai}, title = {Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection}, booktitle = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, pages = {485--489}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MUE.2008.119}, doi = {10.1109/MUE.2008.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/TataraHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/TangC07, author = {Yong Tang and Shigang Chen}, title = {An Automated Signature-Based Approach against Polymorphic Internet Worms}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {18}, number = {7}, pages = {879--892}, year = {2007}, url = {https://doi.org/10.1109/TPDS.2007.1050}, doi = {10.1109/TPDS.2007.1050}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/TangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/TangLX07, author = {Yong Tang and Xicheng Lu and Bin Xiao}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {Generating Simplified Regular Expression Signatures for Polymorphic Worms}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {478--488}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_49}, doi = {10.1007/978-3-540-73547-2\_49}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/TangLX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/RichardsonH07, author = {Theodor Richardson and Chin{-}Tser Huang}, title = {Containing Hitlist-Based Worms with Polymorphic Signatures}, booktitle = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, pages = {652--657}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICCCN.2007.4317891}, doi = {10.1109/ICCCN.2007.4317891}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/RichardsonH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GundyBV07, author = {Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms}, booktitle = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/woot-07/catch-me-if-you-can-evading-network-signatures-web-based-polymorphic-worms}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/GundyBV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/ChenWLZ06, author = {Songqing Chen and Xinyuan Wang and Lei Liu and Xinwen Zhang}, editor = {Laxmi N. Bhuyan and Michel Dubois and Will Eatherton}, title = {WormTerminator: an effective containment of unknown and polymorphic fast spreading worms}, booktitle = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2006, San Jose, California, USA, December 3-5, 2006}, pages = {173--182}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185347.1185371}, doi = {10.1145/1185347.1185371}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/ChenWLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/StephensonS06, author = {Bradley Stephenson and Biplab Sikdar}, title = {A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.93}, doi = {10.1109/INFOCOM.2006.93}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/StephensonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WangHK006, author = {Jisheng Wang and Ihab Hamadeh and George Kesidis and David J. Miller}, title = {Polymorphic worm detection and defense: system design, experimental methodology, and data resources}, booktitle = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, pages = {169--176}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1162666.1162676}, doi = {10.1145/1162666.1162676}, timestamp = {Thu, 03 Feb 2022 15:46:18 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WangHK006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKHK06, author = {Ki Hun Lee and Yuna Kim and Sung Je Hong and Jong Kim}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {45--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_4}, doi = {10.1007/978-3-540-71093-6\_4}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrandallSW05, author = {Jedidiah R. Crandall and Zhendong Su and Shyhtsun Felix Wu and Frederic T. Chong}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {235--248}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102152}, doi = {10.1145/1102120.1102152}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CrandallSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KrugelKMRV05, author = {Christopher Kr{\"{u}}gel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Polymorphic Worm Detection Using Structural Information of Executables}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {207--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_11}, doi = {10.1007/11663812\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NewsomeKS05, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, title = {Polygraph: Automatically Generating Signatures for Polymorphic Worms}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {226--241}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.15}, doi = {10.1109/SP.2005.15}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.