Search dblp for Publications

export results for "toc:db/conf/malware/malware2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/malware/BonfanteKM08,
  author       = {Guillaume Bonfante and
                  Matthieu Kaczmarek and
                  Jean{-}Yves Marion},
  title        = {Morphological detection of malware},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690851},
  doi          = {10.1109/MALWARE.2008.4690851},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BonfanteKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ChouchaneWL08,
  author       = {Mohamed R. Chouchane and
                  Andrew Walenstein and
                  Arun Lakhotia},
  title        = {Using Markov chains to filter machine-morphed variants of malicious
                  programs},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690861},
  doi          = {10.1109/MALWARE.2008.4690861},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ChouchaneWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Craioveanu08,
  author       = {Cristian Craioveanu},
  title        = {Server-side script polumorphism: Techniques of analysis and defense},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690852},
  doi          = {10.1109/MALWARE.2008.4690852},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Craioveanu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DavisFNM08,
  author       = {Carlton R. Davis and
                  Jos{\'{e}} M. Fernandez and
                  Stephen Neville and
                  John McHugh},
  title        = {Sybil attacks as a mitigation strategy against the Storm botnet},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {32--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690855},
  doi          = {10.1109/MALWARE.2008.4690855},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DavisFNM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DittrichD08,
  author       = {David Dittrich and
                  Sven Dietrich},
  title        = {{P2P} as botnet command and control: {A} deeper insight},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690856},
  doi          = {10.1109/MALWARE.2008.4690856},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DittrichD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/HarleyB08,
  author       = {David Harley and
                  Pierre{-}Marc Bureau},
  title        = {Drive-by downloads from the trenches},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {98--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690864},
  doi          = {10.1109/MALWARE.2008.4690864},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/HarleyB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LevyPK08,
  author       = {Jamie Levy and
                  Jaroslaw Paduch and
                  Bilal Khan},
  title        = {Superimposing permutational covert channels onto reliable stream protocols},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690857},
  doi          = {10.1109/MALWARE.2008.4690857},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LevyPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NazarioH08,
  author       = {Jose Nazario and
                  Thorsten Holz},
  title        = {As the net churns: Fast-flux botnet observations},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690854},
  doi          = {10.1109/MALWARE.2008.4690854},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/NazarioH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NielsonCA08,
  author       = {Jordan Nielson and
                  Daniel Medeiros Nunes de Castro and
                  John Aycock},
  title        = {Image spam - {ASCII} to the rescue!},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {65--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690859},
  doi          = {10.1109/MALWARE.2008.4690859},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/NielsonCA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Osorio08,
  author       = {Fernando C. Col{\'{o}}n Osorio},
  title        = {State of wireless security implementations in the United States and
                  Europe - empirical data},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {92--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690863},
  doi          = {10.1109/MALWARE.2008.4690863},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Osorio08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SinhaBJ08,
  author       = {Sushant Sinha and
                  Michael D. Bailey and
                  Farnam Jahanian},
  title        = {Shades of grey: On the effectiveness of reputation-based "blacklists"},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {57--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690858},
  doi          = {10.1109/MALWARE.2008.4690858},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SinhaBJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SunEB08,
  author       = {Li Sun and
                  Tim Ebringer and
                  S. Boztag},
  title        = {An automatic anti-anti-VMware technique applicable for multi-stage
                  packed malware},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690853},
  doi          = {10.1109/MALWARE.2008.4690853},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SunEB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ThomasJ08,
  author       = {Vinoo Thomas and
                  Nitin Jyoti},
  title        = {Combating file infectors on corporate networks},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {85--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690862},
  doi          = {10.1109/MALWARE.2008.4690862},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ThomasJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TianBV08,
  author       = {Ronghua Tian and
                  Lynn Margaret Batten and
                  Steven Versteeg},
  title        = {Function length as a tool for malware classification},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690860},
  doi          = {10.1109/MALWARE.2008.4690860},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TianBV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2008,
  title        = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4686744/proceeding},
  isbn         = {978-1-4244-3288-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics