Detecting malicious files using non-signature-based methods. Vinod, P., Laxmi, V., Gaur, M. S., & Chauhan, G. Int. J. Inf. Comput. Secur., 6(3):199–240, 2014. Paper doi bibtex @article{DBLP:journals/ijics/VinodLGC14,
author = {P. Vinod and
Vijay Laxmi and
Manoj Singh Gaur and
Grijesh Chauhan},
title = {Detecting malicious files using non-signature-based methods},
journal = {Int. J. Inf. Comput. Secur.},
volume = {6},
number = {3},
pages = {199--240},
year = {2014},
url = {https://doi.org/10.1504/IJICS.2014.066646},
doi = {10.1504/IJICS.2014.066646},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"3pv4qA25aMttkM4kB","bibbaseid":"vinod-laxmi-gaur-chauhan-detectingmaliciousfilesusingnonsignaturebasedmethods-2014","downloads":0,"creationDate":"2016-12-12T17:25:37.694Z","title":"Detecting malicious files using non-signature-based methods","author_short":["Vinod, P.","Laxmi, V.","Gaur, M. S.","Chauhan, G."],"year":2014,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["P."],"propositions":[],"lastnames":["Vinod"],"suffixes":[]},{"firstnames":["Vijay"],"propositions":[],"lastnames":["Laxmi"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]},{"firstnames":["Grijesh"],"propositions":[],"lastnames":["Chauhan"],"suffixes":[]}],"title":"Detecting malicious files using non-signature-based methods","journal":"Int. J. Inf. Comput. Secur.","volume":"6","number":"3","pages":"199–240","year":"2014","url":"https://doi.org/10.1504/IJICS.2014.066646","doi":"10.1504/IJICS.2014.066646","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/ijics/VinodLGC14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ijics/VinodLGC14,\n author = {P. Vinod and\n Vijay Laxmi and\n Manoj Singh Gaur and\n Grijesh Chauhan},\n title = {Detecting malicious files using non-signature-based methods},\n journal = {Int. J. Inf. Comput. Secur.},\n volume = {6},\n number = {3},\n pages = {199--240},\n year = {2014},\n url = {https://doi.org/10.1504/IJICS.2014.066646},\n doi = {10.1504/IJICS.2014.066646},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Vinod, P.","Laxmi, V.","Gaur, M. S.","Chauhan, G."],"key":"DBLP:journals/ijics/VinodLGC14","id":"DBLP:journals/ijics/VinodLGC14","bibbaseid":"vinod-laxmi-gaur-chauhan-detectingmaliciousfilesusingnonsignaturebasedmethods-2014","role":"author","urls":{"Paper":"https://doi.org/10.1504/IJICS.2014.066646"},"metadata":{"authorlinks":{"gaur, m":"https://bibbase.org/dblp/Gaur:Manoj_Singh"}},"downloads":0},"search_terms":["detecting","malicious","files","using","non","signature","based","methods","vinod","laxmi","gaur","chauhan"],"keywords":[],"authorIDs":["28AQmWdz4TfnhaQ2u"],"dataSources":["dvnZAb5DbKvsvGk9M","cXmBHMxXA7EJ6F5qG"]}