Determining malicious executable distinguishing attributes and low-complexity detection Hassan KhanFauzan MirzaSyed Ali Khayam Original Paper 27 January 2010 Pages: 95 - 105
Malware detection using assembly and API call sequences Madhu K. ShankarapaniSubbu RamamoorthySrinivas Mukkamala Original Paper 03 April 2010 Pages: 107 - 119
Improving antivirus accuracy with hypervisor assisted analysis Daniel QuistLorie LiebrockJoshua Neil Original Paper 06 April 2010 Pages: 121 - 131
An N-Gram and STF-IDF model for masquerade detection in a UNIX environment Dai GengThmohiro OdakaHisakazu Ogura Original Paper 13 May 2010 Pages: 133 - 142
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned Vincent NicometteMohamed KaânicheMatthieu Herrb Original Paper 27 June 2010 Pages: 143 - 157
Joint network-host based malware detection using information-theoretic tools Syed Ali KhayamAyesha Binte AshfaqHayder Radha Original Paper 27 July 2010 Pages: 159 - 172