Results 1 - 10
of
6,402
Table 2: Comparison of total / average number of collected malware samples for number of captures, binaries, variants, and families between Nepenthes and HoneyBow
"... In PAGE 10: ...7% of the samples in the last scan one whole month after the samples was collected. Table2 summarizes the comparison of collected malware samples for both Ne- penthes and HoneyBow. On average, Nepenthes collects 1,539 samples per day and HoneyBow 1,359, thus Nepenthes captures slightly more samples per day.... In PAGE 11: ...abel Trojan.Delf-1470 and binary B the label Trojan.Delf-142, both belong to the same family, but are di erent variants. As shown in Table2 , during the measurement period, Nepenthes collected 467 di erent malware variations of 64 families, but HoneyBow... ..."
TABLE 2. Completely conserved gene families
2002
Table 3. Top ten types of collected malware
2006
"... In PAGE 16: ... Thus fresh malware is often not detected since the AV vendors do not have signatures for this new threats. Table3 gives an overview of the top ten malware types we collected. We... ..."
Cited by 18
Table 4. Global recognition rates of a Bayesian multivariate classifier including all families Family Weight Slope Size
"... In PAGE 10: ... Another classification trial was done on a set of font families, including the seven learned font families, with a database of 112 fonts. The recognition rates are shown in Table4 . The weight and slope discrimination are still accurate, even when the family and sizes are unknown.... ..."
Table 2: Malware Tools Used to Create Datasets
"... In PAGE 9: ... For every experiment, there were typically two or three hosts involved with one collecting the network data using a packet-sniffing tool. Table2 provides an example of the malware tools used. The intranet training dataset analysed contained 115,925 daily usage and 3003 malware usage records.... ..."
Table 2: Malware breakdown by the propagation vector
2006
"... In PAGE 3: ... In our study, only the first 16 bytes are used for identifying a known virus because many viruses change their size by appending an arbitrary number of bytes. Table2 shows a break-down of these malicious programs by the propagation vector.... ..."
Cited by 4
Table 2: Summary of top malware found in Limewire.
2006
Cited by 3
Table 2: Summary of top malware found in Limewire.
2006
Cited by 3
Table 10. Top ten different malware variants
2007
Cited by 1
Results 1 - 10
of
6,402