, Malware statistics
,
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2009. ,
Polonium: Tera-scale graph mining and inference for malware detection, SIAM INTERNATIONAL CONFERENCE ON DATA MINING (SDM), pp.131-142, 2011. ,
,
Improving the detection of malware behaviour using simplified data dependent api call graph, International Journal of Security and Its Applications, vol.7, issue.5, pp.29-42, 2013. ,
Antivirus performance characterisation: system-wide view, IET Information Security, vol.7, 2013. ,
Dynamic behavior evaluation for malware detection, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), pp.1-6, 2017. ,
Evasive Malware Detection Using Groups of Processes, pp.32-45, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01649019
Overhead analysis and evaluation of approaches to host-based bot detection, International Journal of Distributed Sensor Networks, vol.11, issue.5, p.524627, 2015. ,
Effective and efficient malware detection at the end host, Proceedings of the 18th Conference on USENIX Security Symposium, pp.351-366, 2009. ,
Systems and methods for using a reputation indicator to facilitate malware scanning, US Patent, vol.9, p.77, 2015. ,
Reputation-based security an analysis of real world effectiveness ,
Effort: A new host-network cooperated framework for efficient and effective bot malware detection, Comput. Netw, vol.57, issue.13, 2013. ,
Guilt by association: Large scale malware detection by mining file-relation graphs, Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol.14, pp.1524-1533, 2014. ,
Characterizing antivirus workload execution, vol.33, pp.90-98, 2005. ,
GrAVity: A Massively Parallel Antivirus Engine, pp.79-96, 2010. ,
Panorama: Capturing systemwide information flow for malware detection and analysis, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.116-127, 2007. ,