1 |
F.Apap, A. Honnig, S.Hershkop, E.Eskin, and S.Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), 2002
|
2 |
Carsten Willems, Thorsten Holz, and Felix Freiling, : Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy. 2007
|
3 |
Norman Sandbox, http://www.norman.com/Product/Sandbox-products/en
|
4 |
TTAnalyze, http://fabrice.bellard.free.fr/qemu/
|
5 |
TTAnalyze, http://www.ikarus.at/
|
6 |
CWSandbox, http://www.cwsandbox.org
|
7 |
Apap, F., Honkg, A., Hershkop, S., Eskin, E., Stolfo, S.J : Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection(RAID). 2002
|
8 |
Carl Endorf, Eugene Schultz, Jim Mellander, 'Intrusion Detection & Prevention', McGraw-Hill, 2004
|
9 |
Rebecca Bacel and Peter Mell, 'Intrusion Detection Systems', NIST, 2003
|
10 |
H. Debar, M. Dacie, and A. Wepsi, 'A Revised Taxonomy for Intrusion- Detection Systems', IBM Report, 1999
|
11 |
TTAnalyze, http://www.tuwien.ac.at/
|
12 |
Sunbelt CWSandbox, http://www.sunbelt-software.com/Developer/Sunbelt-CWSandbox/
|
13 |
Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo. An Email Worm Vaccine Architecture. Proceeding of the First Information Security Practice and Experience( ISPEC 2005), 2005
|