DOI: 10.1007/978-3-540-75476-3_36
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Approach for Detecting Executable Codes in Network Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…We note that even using the same 13 instruction groups in[8] we could not verify their results because of inconsistencies and ambiguous statements in their manuscript.…”
mentioning
confidence: 78%
See 1 more Smart Citation
“…We note that even using the same 13 instruction groups in[8] we could not verify their results because of inconsistencies and ambiguous statements in their manuscript.…”
mentioning
confidence: 78%
“…5 Instead, for pedagogical reasons, we revisit a recent approach that is based on using spectrum analysis to detect the presence of executable code in network traffic in lieu of emulation [8].…”
Section: Discussionmentioning
confidence: 99%