Abstract is missing.
- Smartphone malware evolution revisited: Android next target?Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak, Can Yildizli. 1-7 [doi]
- Malware propagation in Online Social NetworksMohammad Reza Faghani, Hossein Saidi. 8-14 [doi]
- Detecting Symbian OS malware through static function call analysisAubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak. 15-22 [doi]
- An automated classification system based on the strings of trojan and virus familiesRonghua Tian, Lynn Margaret Batten, Rafiqul Islam, Steven Versteeg. 23-30 [doi]
- Nebula - generating syntactical network intrusion signaturesTillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini. 31-38 [doi]
- Classification and detection of metamorphic malware using value set analysisFelix Leder, Bastian Steinbock, Peter Martini. 39-46 [doi]
- Obfuscated malicious javascript detection using classification techniquesPeter Likarish, Eunjin Jung, Insoon Jo. 47-54 [doi]
- Server-side dynamic code analysisWadie Guizani, Jean-Yves Marion, Daniel Reynaud-Plantey. 55-62 [doi]
- Malware analysis with graph kernels and support vector machinesCynthia Wagner, Gérard Wagener, Radu State, Thomas Engel. 63-68 [doi]
- The waledac protocol: The how and whyGreg Sinclair, Chris Nunnery, Brent ByungHoon Kang. 69-77 [doi]
- Optimising sybil attacks against P2P-based botnetsCarlton R. Davis, José M. Fernandez, Stephen Neville. 78-87 [doi]
- Malware authors don't learn, and that's good!Joan Calvet, Carlton R. Davis, Pierre-Marc Bureau. 88-97 [doi]
- Analyzing DNS activities of bot processesJose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu. 98-103 [doi]