BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (12)
behavior (7)
learn (5)
system (4)
softwar (4)

Stem malici$ (all stems)

31 papers:

DACDAC-2015-RajendranVK #detection
Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
CHICHI-2015-GadirajuKDD #behaviour #comprehension #crowdsourcing #online
Understanding Malicious Behavior in Crowdsourcing Platforms: The Case of Online Surveys (UG, RK, SD, GD), pp. 1631–1640.
ICSEICSE-v1-2015-YangXALXE #behaviour #mobile #named #using
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ISSTAISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling
Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
KMISKMIS-2014-MikhaylovZFS #development
Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
SACSAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
KDDKDD-2013-ZhaoH #detection #learning #online
Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
SACSAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SACSAC-2013-JancewiczKMRS #execution
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (RJJ, AK, LDM, AR, AAS), pp. 1816–1823.
DACDAC-2012-WeiLKP #benchmark #hardware #metric
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
MLDMMLDM-2012-MaiorcaGC #detection #pattern matching #pattern recognition #recognition
A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
HPCAHPCA-2011-QureshiSLF #detection #online
Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
DATEDATE-2010-DasMZC #detection #hardware #information management #memory management
Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
ICALPICALP-v2-2010-BunnO #network
Asynchronous Throughput-Optimal Routing in Malicious Networks (PB, RO), pp. 236–248.
SEKESEKE-2010-ShinPS #detection
Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
SACSAC-2010-DewaldHF #javascript #named
ADSandbox: sandboxing JavaScript to fight malicious websites (AD, TH, FCF), pp. 1859–1864.
SACSAC-2010-RieckSLHL #detection #named
Botzilla: detecting the “phoning home” of malicious software (KR, GS, TL, TH, PL), pp. 1978–1984.
ICALPICALP-v1-2009-KlivansLS #learning
Learning Halfspaces with Malicious Noise (ARK, PML, RAS), pp. 609–621.
KDDKDD-2009-MaSSV #detection #learning #web
Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
ICEISICEIS-DISI-2008-VoS #component #framework
A Framework for Protecting EJB Applications from Malicious Components (HV, MS), pp. 264–269.
SACSAC-2008-AtallaMAGA #behaviour #peer-to-peer #quality #web
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
SACSAC-2008-FonsecaVM #data access #detection #online #using
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-SaffarianM #algorithm #novel #protocol
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
ESEC-FSEESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
ICSEICSE-2006-MoriISI #detection #mobile
A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
KDDKDD-2004-KolterM #bytecode #detection #learning
Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
HPDCHPDC-2004-GilburdSW #data mining #mining #privacy
Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
SACSAC-2002-WhittakerV #mobile
Neutralizing windows-based malicious mobile code (JAW, ADV), pp. 242–246.
DATEEDTC-1997-BensoPRRU #approach #fault #graph #low level
A new approach to build a low-level malicious fault list starting from high-level description and alternative graphs (AB, PP, MR, MSR, RU), pp. 560–565.
STOCSTOC-1988-KearnsL #fault #learning
Learning in the Presence of Malicious Errors (Extended Abstract) (MJK, ML), pp. 267–280.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.