Cited By
View all- Nurmi JNiemelä MBrumley B(2023)Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised AccessProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605047(1-12)Online publication date: 29-Aug-2023
- Li SMing JQiu PChen QLiu LBao HWang QJia CMeng WJensen CCremers CKirda E(2023)PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer DetectionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616625(3078-3092)Online publication date: 15-Nov-2023
- van Liebergen KCaballero JKotzias PGates C(2023)A Deep Dive into the VirusTotal File FeedDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-35504-2_8(155-176)Online publication date: 12-Jul-2023
- Show More Cited By