• M
  • MALWARE
  • 2012
  • 2012 7th International Conference on Malicious and Unwanted Software
Advanced Search 
2012 7th International Conference on Malicious and Unwanted Software
Fajardo, PR, USA USA
October 16-October 18
ISBN: 978-1-4673-4880-5
Table of Contents
Papers
Andrew Walenstein, School of Computer Science and Informatics, University of Louisiana at Lafayette, USA
Arun Lakhotia, Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA
pp. 17-25
Areej Al-Bataineh, Department of Computer Science, University of Texas at San Antonio, USA
Gregory White, Department of Computer Science, University of Texas at San Antonio, USA
pp. 26-31
Avi Pfeffer, Charles River Analytics, USA
Catherine Call, Charles River Analytics, USA
John Chamberlain, Charles River Analytics, USA
Lee Kellogg, Charles River Analytics, USA
Jacob Ouellette, Charles River Analytics, USA
Terry Patten, Charles River Analytics, USA
Greg Zacharias, Charles River Analytics, USA
Arun Lakhotia, University of Louisiana, Lafayette, USA
Suresh Golconda, University of Louisiana, Lafayette, USA
John Bay, Assured Information Security, USA
Robert Hall, Assured Information Security, USA
Daniel Scofield, Assured Information Security, USA
pp. 39-45
Ferenc Leitold, Veszprog Ltd., College of Dunaújváros, Hungary
Kalman Hadarics, College of Dunaújváros, Hungary
pp. 62-66
Abdelfattah Amamra, Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
Chamseddine Talhi, Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
Jean-Marc Robert, Department of Software Engineering and Information Technologies, École de Technologie Supérieure, Montreal, Canada
pp. 79-86
John Spaulding, Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Alyssa Krauss, Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Avinash Srinivasan, Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
pp. 87-93
Jonghoon Kwon, Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
Heejo Lee, Div. of Computer & Communication Engineering, Korea University, Seoul, Republic of Korea
pp. 104-111
Guillaume Bonfante, Université de Lorraine, LORIA, France
Jean-Yves Marion, Université de Lorraine, LORIA, France
Fabrice Sabatier, INRIA, LORIA, France
Aurelien Thierry, Université de Lorraine, INRIA, France
pp. 112-119
Zhibo Zhao, Wireless Systems Security Research Laboratory and Brandeis University, USA
Fernando C. Colon Osono, Wireless Systems Security Research Laboratory and Brandeis University, USA
pp. 135-143
Markus Herpich, Technische Universität Berlin - DAI-Labor, Germany
Leonid Batyuk, Technische Universität Berlin - DAI-Labor, Germany
Seyit Ahmet Camtepe, Technische Universität Berlin - DAI-Labor, Germany
Sahin Albayrak, Technische Universität Berlin - DAI-Labor, Germany
pp. 73-78
Usage of this product signifies your acceptance of the Terms of Use.