Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Eskandari R, Shajari M and Ghahfarokhi M. (2019). ERES: an extended regular expression signature for polymorphic worm detection. Journal of Computer Virology and Hacking Techniques. 10.1007/s11416-019-00330-1. 15:3. (177-194). Online publication date: 1-Sep-2019.

    http://link.springer.com/10.1007/s11416-019-00330-1

  • Zhang T, Lee W, Gao M and Zhou J. (2019). File Guard: automatic format-based media file sanitization. International Journal of Information Security. 10.1007/s10207-019-00440-3.

    http://link.springer.com/10.1007/s10207-019-00440-3

  • Al-Shaer E, Wei J, Hamlen K and Wang C. (2019). Malware Deception with Automatic Analysis and Generation of HoneyResource. Autonomous Cyber Deception. 10.1007/978-3-030-02110-8_11. (209-235).

    http://link.springer.com/10.1007/978-3-030-02110-8_11

  • Noce J, Lopes Y, Fernandes N, Albuquerque C and Muchaluat-Saade D. (2017). Identifying vulnerabilities in smart gric communication networks of electrical substations using GEESE 2.0 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE). 10.1109/ISIE.2017.8001232. 978-1-5090-1412-5. (111-116).

    http://ieeexplore.ieee.org/document/8001232/

  • Eskandari R, Shajari M and Asadi A. (2015). Automatic signature generation for polymorphic worms by combination of token extraction and sequence alignment approaches 2015 7th Conference on Information and Knowledge Technology (IKT). 10.1109/IKT.2015.7288733. 978-1-4673-7483-5. (1-6).

    http://ieeexplore.ieee.org/document/7288733/

  • Li F, Huang C, Huang J and Peng W. (2014). Feedback-based smartphone strategic sampling for BYOD security 2014 23rd International Conference on Computer Communication and Networks (ICCCN). 10.1109/ICCCN.2014.6911814. 978-1-4799-3572-7. (1-8).

    http://ieeexplore.ieee.org/document/6911814/

  • Li Q, Shi J, Liu T, Guo L and Qin Z. (2014). A probabilistic approach towards modeling email network with realistic features 2014 23rd International Conference on Computer Communication and Networks (ICCCN). 10.1109/ICCCN.2014.6911760. 978-1-4799-3572-7. (1-8).

    http://ieeexplore.ieee.org/document/6911760/

  • Long F, Sidiroglou-Douskos S, Kim D and Rinard M. (2014). Sound input filter generation for integer overflow errors. ACM SIGPLAN Notices. 49:1. (439-452). Online publication date: 13-Jan-2014.

    https://doi.org/10.1145/2578855.2535888

  • Long F, Sidiroglou-Douskos S, Kim D and Rinard M. Sound input filter generation for integer overflow errors. Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. (439-452).

    https://doi.org/10.1145/2535838.2535888

  • Yan Q, Li Y and Deng R. Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. Crisis Management. 10.4018/978-1-4666-4707-7.ch058. (1166-1188).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4707-7.ch058

  • Kaur R and Singh M. A Survey on Zero-Day Polymorphic Worm Detection Techniques. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2014.022714.00160. 16:3. (1520-1549).

    http://ieeexplore.ieee.org/document/6766917/

  • Wang T, Song C and Lee W. (2014). Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. Detection of Intrusions and Malware, and Vulnerability Assessment. 10.1007/978-3-319-08509-8_14. (255-275).

    http://link.springer.com/10.1007/978-3-319-08509-8_14

  • Xu Z, Zhang J, Gu G and Lin Z. AUTOVAC. Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems. (112-123).

    https://doi.org/10.1109/ICDCS.2013.69

  • Yan Q, Li Y and Deng R. Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. Advanced Security and Privacy for RFID Technologies. 10.4018/978-1-4666-3685-9.ch010. (153-175).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-3685-9.ch010

  • Long F, Ganesh V, Carbin M, Sidiroglou S and Rinard M. Automatic input rectification. Proceedings of the 34th International Conference on Software Engineering. (80-90).

    /doi/10.5555/2337223.2337233

  • Long F, Ganesh V, Carbin M, Sidiroglou S and Rinard M. (2012). Automatic input rectification 2012 34th International Conference on Software Engineering (ICSE 2012). 10.1109/ICSE.2012.6227204. 978-1-4673-1066-6. (80-90).

    http://ieeexplore.ieee.org/document/6227204/

  • Difan Zhang , Yu W and Hardy R. (2011). A distributed network-sensor based intrusion detection framework in enterprise networks MILCOM 2011 - 2011 IEEE Military Communications Conference. 10.1109/MILCOM.2011.6127462. 978-1-4673-0081-0. (1195-1200).

    http://ieeexplore.ieee.org/document/6127462/

  • Ramadass S, Abdulla S and Altyeb A. (2011). An automatic, prompt, and accurate exploit-based method to generate polymorphic worm's signature Multimedia Technology (IC-BNMT 2011). 10.1109/ICBNMT.2011.6155891. 978-1-61284-159-5. (37-41).

    http://ieeexplore.ieee.org/document/6155891/

  • Yu W, Wang X, Champion A, Xuan D and Lee D. (2011). On detecting active worms with varying scan rate. Computer Communications. 34:11. (1269-1282). Online publication date: 1-Jul-2011.

    https://doi.org/10.1016/j.comcom.2010.10.014

  • Tang Y, Xiao B and Lu X. (2011). Signature Tree Generation for Polymorphic Worms. IEEE Transactions on Computers. 60:4. (565-579). Online publication date: 1-Apr-2011.

    https://doi.org/10.1109/TC.2010.130

  • Wang X and Jiang X. Artificial malware immunization based on dynamically assigned sense of self. Proceedings of the 13th international conference on Information security. (166-180).

    /doi/10.5555/1949317.1949337

  • Yu W, Zhang N, Fu X and Zhao W. (2010). Self-Disciplinary Worms and Countermeasures. IEEE Transactions on Parallel and Distributed Systems. 21:10. (1501-1514). Online publication date: 1-Oct-2010.

    https://doi.org/10.1109/TPDS.2009.161

  • Lin Z, Zhang X and Xu D. (2010). Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications. IEEE Transactions on Software Engineering. 36:5. (688-703). Online publication date: 1-Sep-2010.

    https://doi.org/10.1109/TSE.2009.54

  • Wang F, Zhang Y, Wang C, Ma J and Moon S. (2010). Stability analysis of a SEIQV epidemic model for rapid spreading worms. Computers and Security. 29:4. (410-418). Online publication date: 1-Jun-2010.

    https://doi.org/10.1016/j.cose.2009.10.002

  • Wang L, Li Z, Chen Y, Fu Z and Li X. (2010). Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM Transactions on Networking. 18:1. (53-66). Online publication date: 1-Feb-2010.

    https://doi.org/10.1109/TNET.2009.2020431

  • Wang X, Pan C, Liu P and Zhu S. (2010). SigFree. IEEE Transactions on Dependable and Secure Computing. 7:1. (65-79). Online publication date: 1-Jan-2010.

    https://doi.org/10.1109/TDSC.2008.30

  • Li L, Just J and Sekar R. Online Signature Generation for Windows Systems. Proceedings of the 2009 Annual Computer Security Applications Conference. (289-298).

    https://doi.org/10.1109/ACSAC.2009.34

  • Tang Y, Xiao B and Lu X. (2009). Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. Computers and Security. 28:8. (827-842). Online publication date: 1-Nov-2009.

    https://doi.org/10.1016/j.cose.2009.06.003

  • Caballero J, Liang Z, Poosankam P and Song D. Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. (161-181).

    https://doi.org/10.1007/978-3-642-04342-0_9

  • Lin Z, Riley R and Xu D. Polymorphing Software by Randomizing Data Structure Layout. Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. (107-126).

    https://doi.org/10.1007/978-3-642-02918-9_7

  • Storer M, Greenan K, Miller E and Voruganti K. (2009). POTSHARDS—a secure, recoverable, long-term archival storage system. ACM Transactions on Storage. 5:2. (1-35). Online publication date: 1-Jun-2009.

    https://doi.org/10.1145/1534912.1534914

  • Erbacher R, Daniels J and Montiero S. OleDetection Forensics and Anti-forensics of Steganography in OLE2-Formatted Documents. Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. (85-96).

    https://doi.org/10.1109/SADFE.2009.18

  • Hanaoka M, Kono K and Hirotsu T. Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference. (262-269).

    https://doi.org/10.1109/CNSR.2009.48

  • TANG Y, LUO J, XIAO B and WEI G. (2009). Concept, Characteristics and Defending Mechanism of Worms. IEICE Transactions on Information and Systems. 10.1587/transinf.E92.D.799. E92-D:5. (799-809).

    http://joi.jlc.jst.go.jp/JST.JSTAGE/transinf/E92.D.799?from=CrossRef

  • Wang X, Jhi Y, Zhu S and Liu P. STILL. Proceedings of the 2008 Annual Computer Security Applications Conference. (289-298).

    https://doi.org/10.1109/ACSAC.2008.37

  • Wang X, Li Z, Choi J, Xu J, Reiter M and Kil C. (2008). Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Transactions on Information and System Security. 12:2. (1-35). Online publication date: 1-Dec-2008.

    https://doi.org/10.1145/1455518.1455523

  • Lin Z and Zhang X. Deriving input syntactic structure from execution. Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering. (83-93).

    https://doi.org/10.1145/1453101.1453114

  • Yu W, Chellappan S, Wang X and Xuan D. (2008). Peer-to-peer system-based active worm attacks. Computer Communications. 31:17. (4005-4017). Online publication date: 1-Nov-2008.

    https://doi.org/10.1016/j.comcom.2008.08.008

  • Wang R, Wang X and Li Z. Panalyst. Proceedings of the 17th conference on Security symposium. (291-306).

    /doi/10.5555/1496711.1496731

  • Portokalidis G and Bos H. (2008). Eudaemon. ACM SIGOPS Operating Systems Review. 42:4. (287-299). Online publication date: 25-Apr-2008.

    https://doi.org/10.1145/1357010.1352622

  • Portokalidis G and Bos H. Eudaemon. Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008. (287-299).

    https://doi.org/10.1145/1352592.1352622

  • Slowinska A and Bos H. (2007). The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 10.1109/ACSAC.2007.32. 0-7695-3060-5. (487-500).

    http://ieeexplore.ieee.org/document/4413014/

  • Li Z, Wang L, Chen Y and Fu Z. (2007). Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms 2007 IEEE International Conference on Network Protocols. 10.1109/ICNP.2007.4375847. 978-1-4244-1587-8. (164-173).

    http://ieeexplore.ieee.org/document/4375847/

  • Moshchuk A, Bragin T, Deville D, Gribble S and Levy H. SpyProxy. Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. (1-16).

    /doi/10.5555/1362903.1362906

  • Tang Y, Lu X and Xiao B. Generating simplified regular expression signatures for polymorphic worms. Proceedings of the 4th international conference on Autonomic and Trusted Computing. (478-488).

    /doi/10.5555/2394798.2394858

  • Cui W, Peinado M, Wang H and Locasto M. ShieldGen. Proceedings of the 2007 IEEE Symposium on Security and Privacy. (252-266).

    https://doi.org/10.1109/SP.2007.34

  • Wang W, Peng D, Wang H and Sharif H. (2007). Image Component Transmissions in Wireless Sensor Network 2007 IEEE Sarnoff Symposium. 10.1109/SARNOF.2007.4567351. 978-1-4244-2483-2. (1-5).

    http://ieeexplore.ieee.org/document/4567351/

  • Wang J, Kesidis G and Miller D. (2007). New directions in covert malware modeling which exploit white-listing 2007 IEEE Sarnoff Symposium. 10.1109/SARNOF.2007.4567340. 978-1-4244-2483-2. (1-7).

    http://ieeexplore.ieee.org/document/4567340/

  • Keromytis A. Characterizing Software Self-healing Systems. Computer Network Security. 10.1007/978-3-540-73986-9_2. (22-33).

    http://link.springer.com/10.1007/978-3-540-73986-9_2

  • Tang Y, Lu X and Xiao B. Generating Simplified Regular Expression Signatures for Polymorphic Worms. Autonomic and Trusted Computing. 10.1007/978-3-540-73547-2_49. (478-488).

    http://link.springer.com/10.1007/978-3-540-73547-2_49