Computing the behavior of malware

Richard C. Linger, Mark G. Pleszkoch, Kirk Sayre, Tim Daly. Computing the behavior of malware. In Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings, editors, Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010. pages 36, ACM, 2010. [doi]

@inproceedings{LingerPSD10,
  title = {Computing the behavior of malware},
  author = {Richard C. Linger and Mark G. Pleszkoch and Kirk Sayre and Tim Daly},
  year = {2010},
  doi = {10.1145/1852666.1852706},
  url = {http://doi.acm.org/10.1145/1852666.1852706},
  researchr = {https://researchr.org/publication/LingerPSD10},
  cites = {0},
  citedby = {0},
  pages = {36},
  booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010},
  editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings},
  publisher = {ACM},
  isbn = {978-1-4503-0017-9},
}