271 | -- | 282 | Safaa O. Al-Mamory, Hongli Zhang. IDS alerts correlation using grammar-based approach |
283 | -- | 293 | Yanfang Ye, Lifei Chen, Dingding Wang, Tao Li, Qingshan Jiang, Min Zhao. SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging |
295 | -- | 308 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici. Unknown malcode detection and the imbalance problem |
309 | -- | 320 | Duc T. Ha, Hung Q. Ngo. On the trade-off between speed and resiliency of Flash worms and similar malcodes |
321 | -- | 334 | Sébastien Josse. White-box attack context cryptovirology |
335 | -- | 343 | Matthew Hayes, Andrew Walenstein, Arun Lakhotia. Evaluation of malware phylogeny modelling systems using automated variant generation |
345 | -- | 355 | Katherine Hoffman, Attila Ondi, Richard Ford, Marco Carvalho, Derek Brown, William H. Allen, Gerald A. Marin. Danger theory and collaborative filtering in MANETs |
357 | -- | 364 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos. Treating scalability and modelling human countermeasures against local preference worms via gradient models |