Hybrid Analysis and Control of Malware. Roundy, K. A. & Miller, B. P. In Proceedings of Recent Advances in Intrusion Detection (RAID), pages 317-338, 2010. Paper bibtex @inproceedings{ dblp2516611,
title = {Hybrid Analysis and Control of Malware},
author = {Kevin A. Roundy and Barton P. Miller},
author_short = {Roundy, K. A. and Miller, B. P.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2010},
key = {dblp2516611},
id = {dblp2516611},
biburl = {http://www.dblp.org/rec/bibtex/conf/raid/RoundyM10},
url = {http://dx.doi.org/10.1007/978-3-642-15512-3_17},
conference = {RAID},
pages = {317-338},
text = {RAID 2010:317-338},
booktitle = {Proceedings of Recent Advances in Intrusion Detection (RAID)}
}
Downloads: 0
{"_id":"svfDERhiPiDisCQmb","bibbaseid":"roundy-miller-hybridanalysisandcontrolofmalware-2010","downloads":0,"creationDate":"2014-12-14T05:19:29.942Z","title":"Hybrid Analysis and Control of Malware","author_short":["Roundy, K. A.","Miller, B. P."],"year":2010,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/raid/RoundyM10","bibdata":{"title":"Hybrid Analysis and Control of Malware","author":["Kevin A. Roundy","Barton P. Miller"],"author_short":["Roundy, K. A.","Miller, B. P."],"bibtype":"inproceedings","type":"inproceedings","year":"2010","key":"dblp2516611","id":"dblp2516611","biburl":"http://www.dblp.org/rec/bibtex/conf/raid/RoundyM10","url":"http://dx.doi.org/10.1007/978-3-642-15512-3_17","conference":"RAID","pages":"317-338","text":"RAID 2010:317-338","booktitle":"Proceedings of Recent Advances in Intrusion Detection (RAID)","bibtex":"@inproceedings{ dblp2516611,\n title = {Hybrid Analysis and Control of Malware},\n author = {Kevin A. Roundy and Barton P. Miller},\n author_short = {Roundy, K. A. and Miller, B. P.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2010},\n key = {dblp2516611},\n id = {dblp2516611},\n biburl = {http://www.dblp.org/rec/bibtex/conf/raid/RoundyM10},\n url = {http://dx.doi.org/10.1007/978-3-642-15512-3_17},\n conference = {RAID},\n pages = {317-338},\n text = {RAID 2010:317-338},\n booktitle = {Proceedings of Recent Advances in Intrusion Detection (RAID)}\n}","bibbaseid":"roundy-miller-hybridanalysisandcontrolofmalware-2010","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-15512-3_17"},"downloads":0},"search_terms":["hybrid","analysis","control","malware","roundy","miller"],"keywords":[],"authorIDs":[],"dataSources":["LDQGPd4LF2oTeX2rJ"]}