1 | -- | 20 | Edward Raff, Richard Zak, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, Charles Nicholas. An investigation of byte n-gram features for malware classification |
21 | -- | 38 | Ayesha Binte Ashfaq, Zainab Abaid, Maliha Ismail, Muhammad Umar Aslam, Affan A. Syed, Syed Ali Khayam. Diagnosing bot infections using Bayesian inference |
39 | -- | 52 | Annapurna Annadatha, Mark Stamp. Image spam analysis and detection |
53 | -- | 68 | Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. State of the art of network protocol reverse engineering tools |
69 | -- | 85 | Yoshihiro Oyama. Trends of anti-analysis operations of malwares observed in API call logs |
87 | -- | 98 | Marcus Botacin, Paulo Lício de Geus, André Ricardo Abed Grégio. The other guys: automated analysis of marginalized malware |
99 | -- | 106 | Yeon-jin Park, Kuen-ho Lee. Constructing a secure hacking-resistant IoT U-healthcare environment |