Article
Licensed
Unlicensed
Requires Authentication
An Empirical Analysis of Malware Blacklists
-
Marc Kührer
Published/Copyright:
April 1, 2012
Published Online: 2012-04
Published in Print: 2012-04
©2012 by Walter de Gruyter GmbH & Co.
You are currently not able to access this content.
You are currently not able to access this content.
Articles in the same Issue
- Masthead
- Network Attack Detection and Defense
- Current Botnet-Techniques and Countermeasures
- An Empirical Analysis of Malware Blacklists
- Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning
- A Framework for Automated Identification of Attack Scenarios on IT Infrastructures
- On Network Monitoring for Intrusion Detection
- Automated Generation of Precise Signatures
- Model-based Cyber Defense Situational Awareness
- Intelligent Defense against Malicious JavaScript Code
- Dependable Embedded Systems & Software (DEEDS) – TU Darmstadt
- Alois Potton hat das Wort
Articles in the same Issue
- Masthead
- Network Attack Detection and Defense
- Current Botnet-Techniques and Countermeasures
- An Empirical Analysis of Malware Blacklists
- Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning
- A Framework for Automated Identification of Attack Scenarios on IT Infrastructures
- On Network Monitoring for Intrusion Detection
- Automated Generation of Precise Signatures
- Model-based Cyber Defense Situational Awareness
- Intelligent Defense against Malicious JavaScript Code
- Dependable Embedded Systems & Software (DEEDS) – TU Darmstadt
- Alois Potton hat das Wort