• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,402
Next 10 →

Table 2: Comparison of total / average number of collected malware samples for number of captures, binaries, variants, and families between Nepenthes and HoneyBow

in Collecting Autonomous Spreading Malware Using
by High-interaction Honeypots, Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
"... In PAGE 10: ...7% of the samples in the last scan one whole month after the samples was collected. Table2 summarizes the comparison of collected malware samples for both Ne- penthes and HoneyBow. On average, Nepenthes collects 1,539 samples per day and HoneyBow 1,359, thus Nepenthes captures slightly more samples per day.... In PAGE 11: ...abel Trojan.Delf-1470 and binary B the label Trojan.Delf-142, both belong to the same family, but are di erent variants. As shown in Table2 , during the measurement period, Nepenthes collected 467 di erent malware variations of 64 families, but HoneyBow... ..."

TABLE 2. Completely conserved gene families

in Poxvirus Orthologous Clusters: toward Defining the Minimum
by Essential Poxvirus Genome, Chris Upton, Stephanie Slack, Arwen L. Hunter, Angelika Ehlers, Rachel L. Roper 2002

Table 3. Malware found

in User Security Behavior on Wireless Networks: An Empirical Study
by Tim Chenoweth, Robert Minch, Sharon Tabor

Table 3. Top ten types of collected malware

in The nepenthes platform: An efficient approach to collect malware
by Paul Baecher, Markus Koetter, Maximillian Dornseif, Felix Freiling 2006
"... In PAGE 16: ... Thus fresh malware is often not detected since the AV vendors do not have signatures for this new threats. Table3 gives an overview of the top ten malware types we collected. We... ..."
Cited by 18

Table 4. Global recognition rates of a Bayesian multivariate classifier including all families Family Weight Slope Size

in ELECTRONIC PUBLISHING, VOL. 6(3), 249–260 (SEPTEMBER 1993) Optical font recognition from projection profiles
by Abdelwahab Zramdini, Rolf Ingold
"... In PAGE 10: ... Another classification trial was done on a set of font families, including the seven learned font families, with a database of 112 fonts. The recognition rates are shown in Table4 . The weight and slope discrimination are still accurate, even when the family and sizes are unknown.... ..."

Table 2: Malware Tools Used to Create Datasets

in DETECTING MALICIOUS USE WITH UNLABELLED DATA USING CLUSTERING AND OUTLIER ANALYSIS
by G. S. Knight, L. Carosielli
"... In PAGE 9: ... For every experiment, there were typically two or three hosts involved with one collecting the network data using a packet-sniffing tool. Table2 provides an example of the malware tools used. The intranet training dataset analysed contained 115,925 daily usage and 3003 malware usage records.... ..."

Table 2: Malware breakdown by the propagation vector

in Malware prevalence in the kazaa file-sharing network
by Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan 2006
"... In PAGE 3: ... In our study, only the first 16 bytes are used for identifying a known virus because many viruses change their size by appending an arbitrary number of bytes. Table2 shows a break-down of these malicious programs by the propagation vector.... ..."
Cited by 4

Table 2: Summary of top malware found in Limewire.

in A study of malware in peer-to-peer networks
by Andrew Kalafut, Abhinav Acharya, Minaxi Gupta 2006
Cited by 3

Table 2: Summary of top malware found in Limewire.

in A study of malware in peerto-peer networks
by Andrew Kalafut, Abhinav Acharya, Minaxi Gupta 2006
Cited by 3

Table 10. Top ten different malware variants

in Measurement and Analysis of Autonomous Spreading Malware in a University Environment
by Jan Goebel, Rwth Aachen, Thorsten Holz, Carsten Willems 2007
Cited by 1
Next 10 →
Results 1 - 10 of 6,402
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University