On the Security of Application Installers and Online Software Repositories. | 0 | 0.34 | 2020 |
We need to talk about antiviruses: challenges & pitfalls of AV evaluations. | 1 | 0.35 | 2020 |
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks | 0 | 0.34 | 2019 |
The other guys: automated analysis of marginalized malware. | 0 | 0.34 | 2018 |
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging. | 1 | 0.35 | 2018 |
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms. | 0 | 0.34 | 2018 |
Lumus: Dynamically Uncovering Evasive Android Applications | 0 | 0.34 | 2018 |
An ontology of suspicious software behavior. | 5 | 0.79 | 2016 |
Toward a Taxonomy of Malware Behaviors. | 6 | 0.68 | 2015 |
Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection | 1 | 0.37 | 2015 |
Return on security investment for cloud computing: a customer perspective. | 2 | 0.66 | 2015 |
Identifying Android malware using dynamically obtained features. | 33 | 1.15 | 2015 |
An approach to security-SLA in cloud computing environment | 5 | 0.58 | 2014 |
An empirical analysis of malicious internet banking software behavior | 2 | 0.37 | 2013 |
Pinpointing malicious activities through network and system-level malware execution behavior | 2 | 0.61 | 2012 |
Tracking memory writes for malware classification and code reuse identification | 1 | 0.38 | 2012 |
A hybrid framework to analyze web and OS malware. | 3 | 0.43 | 2012 |
Interactive, visual-aided tools to analyze malware behavior | 1 | 0.35 | 2012 |
Interactive analysis of computer scenarios through parallel coordinates graphics | 0 | 0.34 | 2012 |
Scalable model-based configuration management of security services in complex enterprise networks | 2 | 0.39 | 2011 |
Formal validation of automated policy refinement in the management of network security systems | 1 | 0.35 | 2010 |
Kolline: a task-oriented system for collaborative information seeking | 4 | 0.43 | 2010 |
Malware distributed collection and pre-classification system using honeypot technology | 1 | 0.39 | 2009 |
Model-based management of security services in complex network environments | 2 | 0.57 | 2008 |
Analisando sistemas de classificação na web sob a perspectiva da interação social em comunidades de prática | 0 | 0.34 | 2008 |
A service-oriented framework to promote interoperability among DRM systems | 1 | 0.36 | 2006 |
Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen | 0 | 0.34 | 2005 |
Improving the configuration management of large network security systems | 6 | 0.65 | 2005 |
On scalability and modularisation in the modelling of network security systems | 3 | 0.44 | 2005 |