Search dblp for Publications

export results for "toc:db/conf/malware/malware2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/malware/AnhND16,
  author       = {Huynh Ngoc Anh and
                  Wee Keong Ng and
                  Hoang Giang Do},
  title        = {On periodic behavior of malware: experiments, opportunities and challenges},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888733},
  doi          = {10.1109/MALWARE.2016.7888733},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AnhND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BlackO16,
  author       = {Paul Black and
                  Joseph Opacki},
  title        = {Anti-analysis trends in banking malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {129--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888738},
  doi          = {10.1109/MALWARE.2016.7888738},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BlackO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CaseyS16,
  author       = {William Casey and
                  Aaron Shelmire},
  title        = {Signature limits: an entire map of clone features and their discovery
                  in nearly linear time},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {147--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888740},
  doi          = {10.1109/MALWARE.2016.7888740},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CaseyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/DamT16,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {Automatic extraction of malicious behaviors},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {47--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888729},
  doi          = {10.1109/MALWARE.2016.7888729},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/DamT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FuJYZB16,
  author       = {Yu Fu and
                  Zhe Jia and
                  Lu Yu and
                  Xingsi Zhong and
                  Richard R. Brooks},
  title        = {A covert data transport protocol},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888734},
  doi          = {10.1109/MALWARE.2016.7888734},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FuJYZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/IqbalZ16,
  author       = {Md. Shahrear Iqbal and
                  Mohammad Zulkernine},
  title        = {Zonedroid: control your droid through application zoning},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888736},
  doi          = {10.1109/MALWARE.2016.7888736},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/IqbalZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JonesSC16,
  author       = {Luke Jones and
                  Andrew J. Sellers and
                  Martin C. Carlisle},
  title        = {{CARDINAL:} similarity analysis to defeat malware compiler variations},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888728},
  doi          = {10.1109/MALWARE.2016.7888728},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JonesSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KarbabDAM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  title        = {DySign: dynamic fingerprinting for the automatic detection of android
                  malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888739},
  doi          = {10.1109/MALWARE.2016.7888739},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KarbabDAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KitanaTW16,
  author       = {Asem Kitana and
                  Issa Traor{\'{e}} and
                  Isaac Woungang},
  title        = {Impact of base transceiver station selection mechanisms on a mobile
                  botnet over a {LTE} network},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {20--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888726},
  doi          = {10.1109/MALWARE.2016.7888726},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KitanaTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Korczynski16,
  author       = {David Korczynski},
  title        = {RePEconstruct: reconstructing binaries with self-modifying code and
                  import address table destruction},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888727},
  doi          = {10.1109/MALWARE.2016.7888727},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Korczynski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KyweLHY16,
  author       = {Su Mon Kywe and
                  Yingjiu Li and
                  Jason I. Hong and
                  Cheng Yao},
  title        = {Dissecting developer policy violating apps: characterization and detection},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {10--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888725},
  doi          = {10.1109/MALWARE.2016.7888725},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/KyweLHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Morales-OrtegaE16,
  author       = {Salvador Morales{-}Ortega and
                  Ponciano Jorge Escamilla{-}Ambrosio and
                  Abraham Rodriguez{-}Mota and
                  Lilian D. Coronado{-}De{-}Alba},
  title        = {Native malware detection in smartphones with android {OS} using static
                  analysis, feature selection and ensemble classifiers},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888731},
  doi          = {10.1109/MALWARE.2016.7888731},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Morales-OrtegaE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Osorio16,
  author       = {Fernando C. Col{\'{o}}n Osorio},
  title        = {Message from the general program chair},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888718},
  doi          = {10.1109/MALWARE.2016.7888718},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Osorio16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/PingAM16,
  author       = {Matthew Ping and
                  Bander Alsulami and
                  Spiros Mancoridis},
  title        = {On the effectiveness of application characteristics in the automatic
                  classification of malware on smartphones},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888732},
  doi          = {10.1109/MALWARE.2016.7888732},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/PingAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/RazoAE16,
  author       = {Sergio Ivan Vargas Razo and
                  Eleazar Aguirre Anaya and
                  Ponciano Jorge Escamilla{-}Ambrosio},
  title        = {Reverse engineering with bioinformatics algorithms over a sound android
                  covert channel},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {3--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888724},
  doi          = {10.1109/MALWARE.2016.7888724},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/RazoAE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SunLYSP16,
  author       = {Lichao Sun and
                  Zhiqiang Li and
                  Qiben Yan and
                  Witawas Srisa{-}an and
                  Yu Pan},
  title        = {SigPID: significant permission identification for android malware
                  detection},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888730},
  doi          = {10.1109/MALWARE.2016.7888730},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/SunLYSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/TroiaVAS16,
  author       = {Fabio Di Troia and
                  Corrado Aaron Visaggio and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Advanced transcriptase for JavaScript malware},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {121--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888737},
  doi          = {10.1109/MALWARE.2016.7888737},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/TroiaVAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/UpchurchZ16,
  author       = {Jason Upchurch and
                  Xiaobo Zhou},
  title        = {Malware provenance: code reuse detection in malicious software at
                  scale},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888735},
  doi          = {10.1109/MALWARE.2016.7888735},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/UpchurchZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Villegas16,
  author       = {Angel M. Villegas},
  title        = {Function identification and recovery signature tool},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888741},
  doi          = {10.1109/MALWARE.2016.7888741},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Villegas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Vitaliev16,
  author       = {Dimitri Vitaliev},
  title        = {Keynote speaker},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888720},
  doi          = {10.1109/MALWARE.2016.7888720},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Vitaliev16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2016,
  title        = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7884714/proceeding},
  isbn         = {978-1-5090-4542-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics