Mining control flow graph as \emphAPI call-grams to detect portable executable malware. Faruki, P., Laxmi, V., Gaur, M. S., & Vinod, P. In 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pages 130–137, 2012. Paper doi bibtex @inproceedings{DBLP:conf/sin/FarukiLGV12,
author = {Parvez Faruki and
Vijay Laxmi and
Manoj Singh Gaur and
P. Vinod},
title = {Mining control flow graph as \emph{API call-grams} to detect portable
executable malware},
booktitle = {5th International Conference of Security of Information and Networks,
{SIN} '12, Jaipur, India, October 22 - 26, 2012},
pages = {130--137},
year = {2012},
crossref = {DBLP:conf/sin/2012},
url = {https://doi.org/10.1145/2388576.2388594},
doi = {10.1145/2388576.2388594},
timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/FarukiLGV12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"hFTzdFtgkRQfhwdy9","bibbaseid":"faruki-laxmi-gaur-vinod-miningcontrolflowgraphasemphapicallgramstodetectportableexecutablemalware-2012","authorIDs":["28AQmWdz4TfnhaQ2u"],"author_short":["Faruki, P.","Laxmi, V.","Gaur, M. S.","Vinod, P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Parvez"],"propositions":[],"lastnames":["Faruki"],"suffixes":[]},{"firstnames":["Vijay"],"propositions":[],"lastnames":["Laxmi"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]},{"firstnames":["P."],"propositions":[],"lastnames":["Vinod"],"suffixes":[]}],"title":"Mining control flow graph as \\emphAPI call-grams to detect portable executable malware","booktitle":"5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012","pages":"130–137","year":"2012","crossref":"DBLP:conf/sin/2012","url":"https://doi.org/10.1145/2388576.2388594","doi":"10.1145/2388576.2388594","timestamp":"Thu, 02 Dec 2021 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/sin/FarukiLGV12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/sin/FarukiLGV12,\n author = {Parvez Faruki and\n Vijay Laxmi and\n Manoj Singh Gaur and\n P. Vinod},\n title = {Mining control flow graph as \\emph{API call-grams} to detect portable\n executable malware},\n booktitle = {5th International Conference of Security of Information and Networks,\n {SIN} '12, Jaipur, India, October 22 - 26, 2012},\n pages = {130--137},\n year = {2012},\n crossref = {DBLP:conf/sin/2012},\n url = {https://doi.org/10.1145/2388576.2388594},\n doi = {10.1145/2388576.2388594},\n timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/sin/FarukiLGV12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Faruki, P.","Laxmi, V.","Gaur, M. S.","Vinod, P."],"key":"DBLP:conf/sin/FarukiLGV12","id":"DBLP:conf/sin/FarukiLGV12","bibbaseid":"faruki-laxmi-gaur-vinod-miningcontrolflowgraphasemphapicallgramstodetectportableexecutablemalware-2012","role":"author","urls":{"Paper":"https://doi.org/10.1145/2388576.2388594"},"metadata":{"authorlinks":{"gaur, m":"https://bibbase.org/dblp/Gaur:Manoj_Singh"}},"downloads":0},"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","creationDate":"2020-12-08T05:21:35.176Z","downloads":0,"keywords":[],"search_terms":["mining","control","flow","graph","emphapi","call","grams","detect","portable","executable","malware","faruki","laxmi","gaur","vinod"],"title":"Mining control flow graph as \\emphAPI call-grams to detect portable executable malware","year":2012,"dataSources":["dvnZAb5DbKvsvGk9M","cXmBHMxXA7EJ6F5qG"]}