1 | -- | 14 | Annie H. Toderici, Mark Stamp. Chi-squared distance and metamorphic virus detection |
15 | -- | 26 | François Goichon, Guillaume Salagnac, Pierre Parrend, Stéphane Frénot. Static vulnerability detection in Java service-oriented components |
27 | -- | 33 | Vlasti Broucek, Paul Turner. Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective |
35 | -- | 47 | Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, Ning Zheng. A similarity metric method of obfuscated malware using function-call graph |