267 | -- | 278 | Hervé Aïache, François Haettel, Laure Lebrun, Cédric Tavernier. Improving security and performance of an Ad Hoc network through a multipath routing strategy |
279 | -- | 287 | Gérard Wagener, Radu State, Alexandre Dulaunoy. Malware behaviour analysis |
289 | -- | 306 | Matt Webster, Grant Malcolm. Formal affordance-based models of computer virus reproduction |
307 | -- | 322 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia. Constructing malware normalizers using term rewriting |
323 | -- | 334 | Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Qingshan Jiang. An intelligent PE-malware detection system based on association mining |
335 | -- | 345 | Stanley J. Barr, Samuel J. Cardman, David M. Martin. A boosting ensemble for the recognition of code sharing in malware |
347 | -- | 356 | Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung. SQL infections through RFID |