next up previous
Next: About this document ... Up: Data Mining Methods for Previous: 9. Conclusions

Bibliography

1
William Arnold and Gerald Tesauro.
Automatically Generated Win32 Heuristic Virus Detection.
Proceedings of the 2000 International Virus Bulletin Conference, 2000.

2
Fred Cohen.
A Short Course on Computer Viruses.
ASP Press, 1990.

3
William Cohen.
Learning Trees and Rules with Set-Valued Features.
American Association for Artificial Intelligence (AAAI), 1996.

4
R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, and M. Casillas.
Automated Assistance for Detecting Malicious Code.
Proceedings of the 6th International Computer Virus and Security Conference, 1993.

5
Cygnus.
GNU Binutils Cygwin.
Online publication, 1999.
http://sourceware.cygnus.com/cygwin.

6
D.Michie, D.J.Spiegelhalter, and C.C.TaylorD.
Machine learning of rules and trees. In Machine Learning, Neural and Statistical Classification.
Ellis Horwood, 1994.

7
Eleazar Eskin, William Noble Grundy, and Yoram Singer.
Protein Family Classification using Sparse Markov Transducers.
Proceedings of the Eighth International Conference on Intelligent Systems for Molecular Biology, 2000.

8
Dmitry Gryaznov.
Scanners of the Year 2000: Heuristics.
Proceedings of the 5th International Virus Bulletin, 1999.

9
Jeffrey O. Kephart and William C. Arnold.
Automatic Extraction of Computer Virus Signatures.
4th Virus Bulletin International Conference, pages 178-184, 1994.

10
P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, and R. Olsson.
Static Analysis Virus Detection Tools for UNIX Systems.
Proceedings of the 13th National Computer Security Conference, pages 350-365, 1990.

11
Zou KH, Hall WJ, and Shapiro D.
Smooth non-parametric ROC curves for continuous diagnostic tests.
Statistics in Medicine, 1997.

12
R Kohavi.
A study of cross-validation and bootstrap for accuracy estimation and model selection.
IJCAI, 1995.

13
W. Lee, S. J. Stolfo, and P. K. Chan.
Learning patterns from UNIX processes execution traces for intrusion detection.
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pages 50-56.
AAAI Press, 1997.

14
Wenke Lee, Sal Stolfo, and Kui Mok.
A Data Mining Framework for Building Intrusion Detection Models.
IEEE Symposium on Security and Privacy, 1999.

15
R.W. Lo, K.N. Levitt, and R.A. Olsson.
MCF: a Malicious Code Filter.
Computers & Security, 14(6):541-566., 1995.

16
MacAfee.
Homepage - MacAfee.com.
Online publication, 2000.
http://www.mcafee.com.

17
Microsoft.
Portable Executable Format.
Online publication, 1999.
http://support.microsoft.com
/support/kb/articles/Q121/4/60.asp.

18
Peter Miller.
Hexdump.
Online publication, 2000.
http://www.pcug.org.au/ millerp/hexdump.html.

19
MIT Lincoln Labs.
1999 DARPA intrusion detection evaluation.

20
Tom Mitchell.
Machine Learning.
McGraw Hill, 1997.

21
Kamal Nigam, Andrew McCallum, Sebastian Thrun, and Tom Mitchell.
Learning to Classify Text from Labeled and Unlabled Documents.
AAAI-98, 1998.

22
Wildlist Organization.
Virus descriptions of viruses in the wild.
Online publication, 2000.
http://www.f-secure.com/virus-info/wild.html.

23
REUTERS.
Microsoft Hack Shows Companies Are Vulnerable.
New York Times, October 29, 2000.

24
Eugene H. Spafford.
The Internet worm program: an analysis.
Tech. Report CSD-TR-823, 1988.
Department of Computer Science, Purdue University.

25
Gerald Tesauro, Jeffrey O. Kephart, and Gregory B. Sorkin.
Neural Networks for Computer Virus Recognition.
IEEE Expert, 11(4):5-6.
IEEE Computer Society, August, 1996.

26
Steve R. White.
Open Problems in Computer Virus Research.
Virus Bulletin Conference, 1998.

27
Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, and John F. Morar.
Anatomy of a Commercial-Grade Immune System.
IBM Research White Paper, 1999.
http://www.av.ibm.com/ScientificPapers/White/
Anatomy/anatomy.html.



Erez Zadok
2001-05-19