Next: About this document ...
Up: Data Mining Methods for
Previous: 9. Conclusions
- 1
-
William Arnold and Gerald Tesauro.
Automatically Generated Win32 Heuristic Virus Detection.
Proceedings of the 2000 International Virus Bulletin
Conference, 2000.
- 2
-
Fred Cohen.
A Short Course on Computer Viruses.
ASP Press, 1990.
- 3
-
William Cohen.
Learning Trees and Rules with Set-Valued Features.
American Association for Artificial Intelligence (AAAI), 1996.
- 4
-
R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, and M. Casillas.
Automated Assistance for Detecting Malicious Code.
Proceedings of the 6th International Computer Virus and Security
Conference, 1993.
- 5
-
Cygnus.
GNU Binutils Cygwin.
Online publication, 1999.
http://sourceware.cygnus.com/cygwin.
- 6
-
D.Michie, D.J.Spiegelhalter, and C.C.TaylorD.
Machine learning of rules and trees. In Machine Learning, Neural
and Statistical Classification.
Ellis Horwood, 1994.
- 7
-
Eleazar Eskin, William Noble Grundy, and Yoram Singer.
Protein Family Classification using Sparse Markov Transducers.
Proceedings of the Eighth International Conference on
Intelligent Systems for Molecular Biology, 2000.
- 8
-
Dmitry Gryaznov.
Scanners of the Year 2000: Heuristics.
Proceedings of the 5th International Virus Bulletin, 1999.
- 9
-
Jeffrey O. Kephart and William C. Arnold.
Automatic Extraction of Computer Virus Signatures.
4th Virus Bulletin International Conference, pages 178-184,
1994.
- 10
-
P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, and R. Olsson.
Static Analysis Virus Detection Tools for UNIX Systems.
Proceedings of the 13th National Computer Security Conference,
pages 350-365, 1990.
- 11
-
Zou KH, Hall WJ, and Shapiro D.
Smooth non-parametric ROC curves for continuous diagnostic tests.
Statistics in Medicine, 1997.
- 12
-
R Kohavi.
A study of cross-validation and bootstrap for accuracy estimation and
model selection.
IJCAI, 1995.
- 13
-
W. Lee, S. J. Stolfo, and P. K. Chan.
Learning patterns from UNIX processes execution traces for intrusion
detection.
AAAI Workshop on AI Approaches to Fraud Detection and Risk
Management, pages 50-56.
AAAI Press, 1997.
- 14
-
Wenke Lee, Sal Stolfo, and Kui Mok.
A Data Mining Framework for Building Intrusion Detection Models.
IEEE Symposium on Security and Privacy, 1999.
- 15
-
R.W. Lo, K.N. Levitt, and R.A. Olsson.
MCF: a Malicious Code Filter.
Computers & Security, 14(6):541-566., 1995.
- 16
-
MacAfee.
Homepage - MacAfee.com.
Online publication, 2000.
http://www.mcafee.com.
- 17
-
Microsoft.
Portable Executable Format.
Online publication, 1999.
http://support.microsoft.com
/support/kb/articles/Q121/4/60.asp.
- 18
-
Peter Miller.
Hexdump.
Online publication, 2000.
http://www.pcug.org.au/ millerp/hexdump.html.
- 19
-
MIT Lincoln Labs.
1999 DARPA intrusion detection evaluation.
- 20
-
Tom Mitchell.
Machine Learning.
McGraw Hill, 1997.
- 21
-
Kamal Nigam, Andrew McCallum, Sebastian Thrun, and Tom Mitchell.
Learning to Classify Text from Labeled and Unlabled Documents.
AAAI-98, 1998.
- 22
-
Wildlist Organization.
Virus descriptions of viruses in the wild.
Online publication, 2000.
http://www.f-secure.com/virus-info/wild.html.
- 23
-
REUTERS.
Microsoft Hack Shows Companies Are Vulnerable.
New York Times, October 29, 2000.
- 24
-
Eugene H. Spafford.
The Internet worm program: an analysis.
Tech. Report CSD-TR-823, 1988.
Department of Computer Science, Purdue University.
- 25
-
Gerald Tesauro, Jeffrey O. Kephart, and Gregory B. Sorkin.
Neural Networks for Computer Virus Recognition.
IEEE Expert, 11(4):5-6.
IEEE Computer Society, August, 1996.
- 26
-
Steve R. White.
Open Problems in Computer Virus Research.
Virus Bulletin Conference, 1998.
- 27
-
Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M.
Chess, and John F. Morar.
Anatomy of a Commercial-Grade Immune System.
IBM Research White Paper, 1999.
http://www.av.ibm.com/ScientificPapers/White/
Anatomy/anatomy.html.
Erez Zadok
2001-05-19