{"_id":"3vYRxeYsFXWfuwfab","bibbaseid":"nair-jain-golecha-gaur-laxmi-medusametamorphicmalwaredynamicanalysisusingsignaturefromapi-2010","downloads":0,"creationDate":"2016-12-12T17:25:37.778Z","title":"MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API","author_short":["Nair, V. P.","Jain, H.","Golecha, Y. K.","Gaur, M. S.","Laxmi, V."],"year":2010,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Vinod","P."],"propositions":[],"lastnames":["Nair"],"suffixes":[]},{"firstnames":["Harshit"],"propositions":[],"lastnames":["Jain"],"suffixes":[]},{"firstnames":["Yashwant","K."],"propositions":[],"lastnames":["Golecha"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]},{"firstnames":["Vijay"],"propositions":[],"lastnames":["Laxmi"],"suffixes":[]}],"title":"MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API","booktitle":"Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010","pages":"263–269","year":"2010","crossref":"DBLP:conf/sin/2010","url":"https://doi.org/10.1145/1854099.1854152","doi":"10.1145/1854099.1854152","timestamp":"Sun, 25 Oct 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/sin/NairJGGL10.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/sin/NairJGGL10,\n author = {Vinod P. Nair and\n Harshit Jain and\n Yashwant K. Golecha and\n Manoj Singh Gaur and\n Vijay Laxmi},\n title = {{MEDUSA:} MEtamorphic malware dynamic analysis usingsignature from\n {API}},\n booktitle = {Proceedings of the 3rd International Conference on Security of Information\n and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September\n 7-11, 2010},\n pages = {263--269},\n year = {2010},\n crossref = {DBLP:conf/sin/2010},\n url = {https://doi.org/10.1145/1854099.1854152},\n doi = {10.1145/1854099.1854152},\n timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/sin/NairJGGL10.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Nair, V. P.","Jain, H.","Golecha, Y. K.","Gaur, M. S.","Laxmi, V."],"key":"DBLP:conf/sin/NairJGGL10","id":"DBLP:conf/sin/NairJGGL10","bibbaseid":"nair-jain-golecha-gaur-laxmi-medusametamorphicmalwaredynamicanalysisusingsignaturefromapi-2010","role":"author","urls":{"Paper":"https://doi.org/10.1145/1854099.1854152"},"metadata":{"authorlinks":{"gaur, m":"https://bibbase.org/dblp/Gaur:Manoj_Singh"}},"downloads":0},"search_terms":["medusa","metamorphic","malware","dynamic","analysis","usingsignature","api","nair","jain","golecha","gaur","laxmi"],"keywords":[],"authorIDs":["28AQmWdz4TfnhaQ2u"],"dataSources":["dvnZAb5DbKvsvGk9M","cXmBHMxXA7EJ6F5qG"]}