Causality reasoning about network events for detecting stealthy malware activities (English)
- New search for: Hao Zhang
- New search for: Hao Zhang
- New search for: Danfeng(Daphne Yao
- New search for: Naren Ramakrishnan
- New search for: Zhibin Zhang
In:
Computers & security
;
58
; 180-198
;
2016
-
ISSN:
- Article (Journal) / Print
-
Title:Causality reasoning about network events for detecting stealthy malware activities
-
Contributors:
-
Published in:Computers & security ; 58 ; 180-198
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:2016
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 58
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
CIPA: A collaborative intrusion prevention architecture for programmable network and SDNChen, Xiao-Fan / Yu, Shun-Zheng et al. | 2015
- 20
-
An approach for deploying and monitoring dynamic security policiesHorcas, Jose-Miguel / Pinto, Mónica / Fuentes, Lidia / Mallouli, Wissam / Montes de Oca, Edgardo et al. | 2015
- 39
-
Phishing: An economic analysis of cybercrime perpetratorsKonradt, Christian / Schilling, Andreas / Werners, Brigitte et al. | 2015
- 47
-
A study on Web security incidents in China by analyzing vulnerability disclosure platformsHuang, Cheng / Liu, JiaYong / Fang, Yong / Zuo, Zheng et al. | 2015
- 63
-
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanismsAsghar, Hira / Anwar, Zahid / Latif, Khalid et al. | 2015
- 83
-
A comprehensive approach for network attack forecastingGhasemiGol, Mohammad / Ghaemi-Bafghi, Abbas / Takabi, Hassan et al. | 2015
- 106
-
Proactively applied encryption in multipath networksObert, James / Pivkina, Inna / Huang, Hong / Cao, Huiping et al. | 2015
- 125
-
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric informationJang, Jae-wook / Kang, Hyunjae / Woo, Jiyoung / Mohaisen, Aziz / Kim, Huy Kang et al. | 2015
- 139
-
Effect of anti-malware software on infectious nodes in cloud environmentAbazari, Farzaneh / Analoui, Morteza / Takabi, Hassan et al. | 2015
- 149
-
False sequential logic attack on SCADA system and its physical impact analysisLi, Weize / Xie, Lun / Deng, Zulan / Wang, Zhiliang et al. | 2016
- 160
-
Privacy preservation for soft biometrics based multimodal recognition systemSadhya, Debanjan / Singh, Sanjay Kumar et al. | 2016
- 180
-
Causality reasoning about network events for detecting stealthy malware activitiesZhang, Hao / Yao, Danfeng (Daphne) / Ramakrishnan, Naren / Zhang, Zhibin et al. | 2016
- 199
-
A formal model and risk assessment method for security-critical real-time embedded systemsNi, Siru / Zhuang, Yi / Gu, Jingjing / Huo, Ying et al. | 2016
- 216
-
The impact of information security events to the stock market: A systematic literature reviewSpanos, Georgios / Angelis, Lefteris et al. | 2015
- 230
-
Combating the evasion mechanisms of social botsJi, Yuede / He, Yukun / Jiang, Xinyang / Cao, Jian / Li, Qiang et al. | 2016
- 250
-
Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal linesUlaş, Cihan / Aşık, Ulaş / Karadeniz, Cantürk et al. | 2016
- 268
-
Are mobile botnets a possible threat? The case of SlowBot NetFarina, Paolo / Cambiaso, Enrico / Papaleo, Gianluca / Aiello, Maurizio et al. | 2016
- CO2
-
IFC - Editorial Board| 2016
- iii
-
Contents| 2016