Malware images: visualization and automatic classification L Nataraj, S Karthikeyan, G Jacob, BS Manjunath 8th International Symposium on Visualization for Cyber Security, 4, 2011 | 1352 | 2011 |
Behavioral detection of malware: from a survey towards an established taxonomy G Jacob, H Debar, E Filiol Journal in computer Virology 4 (3), 251-266, 2008 | 314 | 2008 |
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic G Jacob, R Hund, C Kruegel, T Holz USENIX Security Symposium, 2011 | 199 | 2011 |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples G Jacob, PM Comparetti, M Neugschwandtner, C Krügel, G Vigna 9th Conference on Detection of Intrusions and Malware and Vulnerability …, 2012 | 108 | 2012 |
EVILCOHORT: detecting communities of malicious accounts on online services G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna 24th USENIX Security Symposium (USENIX Security 15), 563-578, 2015 | 101 | 2015 |
Evaluation methodology and theoretical model for antiviral behavioural detection strategies E Filiol, G Jacob, M Le Liard Journal in Computer Virology 3 (1), 23-37, 2007 | 76 | 2007 |
PUBCRAWL: Protecting Users and Businesses from CRAWLers G Jacob, E Kirda, C Kruegel, G Vigna USENIX Security Symposium, 2012 | 70 | 2012 |
Malware behavioral detection by attribute-automata using abstraction from platform and language G Jacob, H Debar, E Filiol 12th Symposium on Recent Advances in Intrusion Detection, 81-100, 2009 | 58* | 2009 |
Individual countermeasure selection based on the return on response investment index G Gonzalez Granadillo, H Débar, G Jacob, C Gaber, M Achemlal 6th International Conference on Mathematical Methods, Models and …, 2012 | 50 | 2012 |
FORECAST: skimming off the malware cream M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel 27th Annual Computer Security Applications Conference, 11-20, 2011 | 44 | 2011 |
RORI-based countermeasure selection using the OrBAC formalism GG Granadillo, M Belhaouane, H Debar, G Jacob International Journal of Information Security 13 (1), 63-79, 2014 | 33 | 2014 |
Formalization of viruses and malware through process algebras G Jacob, E Filiol, H Debar 4th Workshop on Advances in Information Security, Satellite of ARES, 597-602, 2010 | 26* | 2010 |
Malware as interaction machines: a new framework for behavior modelling G Jacob, E Filiol, H Debar Journal in Computer Virology 4 (3), 235-250, 2008 | 26 | 2008 |
Functional polymorphic engines: formalisation, implementation and use cases G Jacob, E Filiol, H Debar Journal in computer virology 5 (3), 247-261, 2009 | 23 | 2009 |
Combination approach to select optimal countermeasures based on the RORI Index GDG GRANADILLO, G Jacob, H DEBAR, L COPPOLINO INTECH'12: Second International Conference on Innovative Computing …, 2012 | 18 | 2012 |
Limitation of honeypot/honeynet databases to enhance alert correlation Y Mustapha, H Débar, G Jacob 6th International Conference on Mathematical Methods, Models and …, 2012 | 15 | 2012 |
Detecting Packed Executables based on Raw Binary Data L Nataraj, G Jacob, BS Manjunath Technical Report VRL, ECE, 2010 | 13 | 2010 |
Attack Volume Model: Geometrical Approach and Application GG Granadillo, G Jacob, H Debar International Conference on Risks and Security of Internet and Systems, 242-257, 2015 | 4 | 2015 |
Malware Behavioral Models: Bridging Abstract and Operational Virology G Jacob PhD thesis, Université de Rennes, 2009 | 2 | 2009 |
ForeCast MN Neugschwandtner, PM Comparek, G Jacob, C Kruegel | | |