Abstract is missing.
- Game-theoretic design of an information exchange model for detecting packed malwareAnshuman Singh, Arun Lakhotia. 1-7 [doi]
- Multiprocess malwareMarco Ramilli, Matt Bishop, Shining Sun. 8-13 [doi]
- Exploring network-based malware classificationNatalia Stakhanova, Mathieu Couture, Ali A. Ghorbani. 14-20 [doi]
- Testing protections against web threatsFerenc Leitold. 20-26 [doi]
- Evaluating security products based on appropriate usageVikram Phatak, Rick Moy. 27-33 [doi]
- Distributed malware analysis schedulingRodrigo Rubira Branco, Gabriel Negreira Barbosa. 34-41 [doi]
- Results-oriented securityMatt Bishop, Richard Ford, Marco Ramilli. 42-49 [doi]
- Building malware infection treesJose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu. 50-57 [doi]
- ROP payload detection using speculative code executionMichalis Polychronakis, Angelos D. Keromytis. 58-65 [doi]
- Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applicationsLeonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak. 66-72 [doi]
- DroidDreamLight lurks behind legitimate Android appsMark Balanza, Kervin Alintanahin, Oscar Abendan, Julius Dizon, Bernadette Caraig. 73-78 [doi]
- Android platform based linux kernel rootkitDong-Hoon You, Bong-Nam Noh. 79-87 [doi]
- Secure service distribution for VErsatile Service-Oriented Wireless Mesh NetworksHector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez. 88-94 [doi]
- Phishing by form: The abuse of form sitesHugo Gonzalez-Robledo, Kara Nance, Jose Nazario. 95-101 [doi]
- Evidence of Advanced Persistent Threat: A case study of malware for political espionageFrankie Li, Anthony Lai, DDL. 102-109 [doi]
- A recoverable hybrid C&C botnetChaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui. 110-118 [doi]