Amanote Research
Register
Sign In
Mining Specifications of Malicious Behavior
doi 10.1145/1342211.1342215
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2008
Authors
Mihai Christodorescu
Somesh Jha
Christopher Kruegel
Publisher
ACM Press
Related search
Uncivil and Malicious Behavior in Science
Archives of Environmental and Occupational Health
Environmental Science
Mutagenesis
Public Health
Environmental
Health
Toxicology
Occupational Health
The Algorithm of Malicious Code Detection Based on Data Mining
Classifying Malicious Thread Behavior in PaaS Web Services
Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants
SEQUIN: A Grammar Inference Framework for Analyzing Malicious System Behavior
Journal of Computer Virology and Hacking Techniques
Hardware
Architecture
Computer Science
Mathematics
Computational Theory
Software
A Software Complex for Revealing Malicious Behavior in Untrusted Binary Code
Proceedings of the Institute for System Programming of the RAS
Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching
International Journal of Computer Applications
Toward Detecting Malicious Activities in Online Social Network Through User Behavior
International Journal for Research in Applied Science and Engineering Technology
Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction
Applied Sciences (Switzerland)
Instrumentation
Materials Science
Fluid Flow
Engineering
Computer Science Applications
Process Chemistry
Transfer Processes
Technology