Assessing the accuracy of prediction algorithms for classification: an overview, Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, pp.412-436, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412
Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp.201-203, 2010. ,
DOI : 10.1109/ACT.2010.33
The Evolution of System-Call Monitoring, 2008 Annual Computer Security Applications Conference (ACSAC), pp.418-430, 2008. ,
DOI : 10.1109/ACSAC.2008.54
Reconstruction Attack through Classifier Analysis, Proceedings of the 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, pp.274-281, 2012. ,
DOI : 10.1145/974121.974131
URL : https://hal.archives-ouvertes.fr/hal-00736945
Learning to detect malicious executables in the wild, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.470-478, 2004. ,
DOI : 10.1145/1014052.1014105
A guided tour to approximate string matching, ACM Computing Surveys, vol.33, issue.1, pp.31-88, 2001. ,
DOI : 10.1145/375360.375365
URL : http://www.dcc.uchile.cl/~gnavarro/ps/acmcs01.1.ps.gz
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications, The 13th International Conference on Applied Cryptography and Network Security, 2015. ,
DOI : 10.1007/978-3-319-28166-7_24
Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007. ,
DOI : 10.1109/ACSAC.2007.21
Host Based Intrusion Detection using Machine Learning, 2007 IEEE Intelligence and Security Informatics, pp.107-114, 2007. ,
DOI : 10.1109/ISI.2007.379542
URL : http://medinfo.ise.bgu.ac.il/medlab/MembersHomePages/RobPapers/Moskovitch.UMCD.ISI2007.pdf
Detecting System Emulators, Proceedings of Information Security, 10th International Conference, pp.1-18, 2007. ,
DOI : 10.1007/978-3-540-75496-1_1
URL : http://www.auto.tuwien.ac.at/~chris/research/doc/isc07_detection.pdf
Method for Detecting Unknown Malicious Executables, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, pp.376-377, 2009. ,
DOI : 10.1007/978-3-642-04342-0_31
Automated Response Using System-Call Delays, Proceedings of the 9th USENIX Security Symposium, pp.185-198, 2000. ,
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks, Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, pp.146-164, 2005. ,
DOI : 10.1007/11663812_8
URL : http://www.comp.nus.edu.sg/~tslsufat/sufatrio-yap-raid05.pdf
ON THE LEARNING OF SYSTEM CALL ATTRIBUTES FOR HOST-BASED ANOMALY DETECTION, International Journal on Artificial Intelligence Tools, vol.15, issue.06, pp.875-892, 2006. ,
DOI : 10.1016/S1389-1286(00)00139-0
Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.255-264, 2002. ,
DOI : 10.1145/586110.586145