Malware Modeling and Experimentation through Parameterized Behavior. Celik, Z. B., McDaniel, P., & Bowen, T. Journal of Defense Modeling and Simulation (JDMS), 15(1):31–48, 2018.
Paper bibtex 2 downloads @Article{Berkay2017MalwareModellingJDMS,
author = {Celik, Z. Berkay and McDaniel, Patrick and Bowen, Thomas},
journal = {Journal of Defense Modeling and Simulation (JDMS)},
title = {{Malware Modeling and Experimentation through Parameterized Behavior}},
volume={15},
number={1},
pages={31--48},
year={2018},
url = {https://beerkay.github.io/papers/berkay2017MalwareModellingJDMS.pdf}
}
Downloads: 2
{"_id":"pEhi5kbE3Fkdmtz5M","bibbaseid":"celik-mcdaniel-bowen-malwaremodelingandexperimentationthroughparameterizedbehavior-2018","downloads":2,"creationDate":"2018-07-31T03:19:12.795Z","title":"Malware Modeling and Experimentation through Parameterized Behavior","author_short":["Celik, Z. B.","McDaniel, P.","Bowen, T."],"year":2018,"bibtype":"article","biburl":"https://beerkay.github.io/papers/myPublications.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Celik"],"firstnames":["Z.","Berkay"],"suffixes":[]},{"propositions":[],"lastnames":["McDaniel"],"firstnames":["Patrick"],"suffixes":[]},{"propositions":[],"lastnames":["Bowen"],"firstnames":["Thomas"],"suffixes":[]}],"journal":"Journal of Defense Modeling and Simulation (JDMS)","title":"Malware Modeling and Experimentation through Parameterized Behavior","volume":"15","number":"1","pages":"31–48","year":"2018","url":"https://beerkay.github.io/papers/berkay2017MalwareModellingJDMS.pdf","bibtex":"@Article{Berkay2017MalwareModellingJDMS,\n author = {Celik, Z. Berkay and McDaniel, Patrick and Bowen, Thomas},\n journal = {Journal of Defense Modeling and Simulation (JDMS)},\n title = {{Malware Modeling and Experimentation through Parameterized Behavior}},\n volume={15},\n number={1},\n pages={31--48},\n year={2018},\n url = {https://beerkay.github.io/papers/berkay2017MalwareModellingJDMS.pdf}\n}\n\n \n","author_short":["Celik, Z. B.","McDaniel, P.","Bowen, T."],"key":"Berkay2017MalwareModellingJDMS","id":"Berkay2017MalwareModellingJDMS","bibbaseid":"celik-mcdaniel-bowen-malwaremodelingandexperimentationthroughparameterizedbehavior-2018","role":"author","urls":{"Paper":"https://beerkay.github.io/papers/berkay2017MalwareModellingJDMS.pdf"},"metadata":{"authorlinks":{"celik, z":"https://beerkay.github.io/fullpublication/"}},"downloads":2},"search_terms":["malware","modeling","experimentation","through","parameterized","behavior","celik","mcdaniel","bowen"],"keywords":[],"authorIDs":["2miLs7EJSLj6tgEZz","5adb59a55aed6710000000a0","5dfc622fecededde01000095","5e124ce931427bdf01000021","5e1c5acce556c6de01000167","5e2c7cbbce5606de01000093","5e3782c0ac7fe8de01000153","5e39760d346d7cde0100018e","5e3b9e3d69c38bde01000057","5e5089f97e0827df0100008a","M9BLNXrtsEY2dLgng","Xr2oz2WYjPQxRBrZA","dSxkf283qhMzY3QG9","hNNLvP3YrqEKno2eL","mduYG7eYjEBHRNa29","omf2FZPyLJsufBSsy","psiMHmxBCnC69dYqp","tNukCrYRycqdyZF97","uN77HDSE86zvjth5x","uxm22ihJQmGHEq3Ee"],"dataSources":["pzatXK8Qzi4taQTqY","Z6kChNLF2NcgPrzyg","bc73Eqox2pPuwmAyT","zKytcgTsdu3euRBgS","QZu7oZrNHQ6m88cDC"]}