• M
  • MALWARE
  • 2011
  • 2011 6th International Conference on Malicious and Unwanted Software
Advanced Search 
2011 6th International Conference on Malicious and Unwanted Software
Fajardo, PR, USA
October 18-October 19
ISBN: 978-1-4673-0031-5
Table of Contents
Papers
Anshuman Singh, University of Louisiana at Lafayette
Arun Lakhotia, University of Louisiana at Lafayette
pp. 1-7
Marco Ramilli, DEIS, Univ. of Bologna Via Venezia, 52 - 47023, Cesena, Italy
Matt Bishop, Department of Computer Science, Univ. of California, Davis, Davis, CA 95616-8562, USA
Shining Sun, Computer Science, Univ. of Hong Kong, Hong Kong
pp. 8-13
Natalia Stakhanova, School of CIS, University of South Alabama, Mobile, AL, USA
Mathieu Couture, Communications Research Centre Canada, Ottawa, ON, Canada
Ali A. Ghorbani, Faculty of CS, University of New Brunswick, Fredericton, NB, Canada
pp. 14-20
Ferenc Leitold, Veszprog Ltd., College of Dunaújváros
pp. 20-26
Rodrigo Rubira Branco, Qualys Vulnerability & Malware Research Labs (VMRL)
Gabriel Negreira Barbosa, Qualys Vulnerability & Malware Research Labs (VMRL)
pp. 34-41
Matt Bishop, Dept. of Computer Science, University of California at Davis, Davis, CA 95616-8562 USA
Richard Ford, Harris Institute for Assured Information, Florida Institute of Technology, 150 W. University Blvd, Melbourne, FL 32901 USA
Marco Ramilli, D.E.I.S., University of Bologna, Via Venezia, 52 - 47023 Cesena Italy
pp. 42-49
Jose Andre Morales, Software Engineering Institute, Carnegie Mellon University
Michael Main, Institute for Cyber Security, University of Texas at San Antonio
Weiliang Luo, Institute for Cyber Security, University of Texas at San Antonio
Shouhuai Xu, Institute for Cyber Security, University of Texas at San Antonio
Ravi Sandhu, Institute for Cyber Security, University of Texas at San Antonio
pp. 50-57
Leonid Batyuk, Technische Universität Berlin - DAI-Labor
Markus Herpich, Technische Universität Berlin - DAI-Labor
Seyit Ahmet Camtepe, Technische Universität Berlin - DAI-Labor
Karsten Raddatz, Technische Universität Berlin - DAI-Labor
Aubrey-Derrick Schmidt, Technische Universität Berlin - DAI-Labor
Sahin Albayrak, Technische Universität Berlin - DAI-Labor
pp. 66-72
Mark Balanza, Trend Micro, Inc.
Oscar Abendan, Trend Micro, Inc.
Kervin Alintanahin, Trend Micro, Inc.
Julius Dizon, Trend Micro, Inc.
Bernadette Caraig, Trend Micro, Inc.
pp. 73-78
Dong-Hoon You, INetCop Security
Bong-Nam Noh, System Security Research Center, Chonnam National University
pp. 79-87
Hector M. Lugo-Cordero, Dept. of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida
Ratan K. Guha, Dept. of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida
Kejie Lu, Dept. of Electrical and Computer Engineering, University of Puerto Rico, Mayagüez Campus, Mayagüez, Puerto Rico
Domingo Rodriguez, Dept. of Electrical and Computer Engineering, University of Puerto Rico, Mayagüez Campus, Mayagüez, Puerto Rico
pp. 88-94
Hugo Gonzalez, Universidad Politecnica de, San Luis Potosi
Kara Nance, University of Alaska, Fairbanks
Jose Nazario, Arbor Networks
pp. 95-101
Frankie Li, Valkyrie-X Security Research Group
Anthony Lai, Valkyrie-X Security Research Group
Ddl Ddl, Valkyrie-X Security Research Group
pp. 102-109
Chaoge Liu, Beijing University of Posts and Telecommunications
Weiqing Lu, Institute of Computing Technology, Chinese Academy of Sciences
Zhiqi Zhang, Beijing University of Posts and Telecommunications
Peng Liao, Institute of Computing Technology, Chinese Academy of Sciences
Xiang Cui, Institute of Computing Technology, Chinese Academy of Sciences
pp. 110-118
Usage of this product signifies your acceptance of the Terms of Use.