Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,990 papers from all fields of science
Search
Sign In
Create Free Account
UPX
UPX (Ultimate Packer for Executables) is a free and open source executable packer supporting a number of file formats from different operating…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
ARM architecture
Antivirus software
Assembly language
Atari
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Pruned feature space for metamorphic malware detection using Markov Blanket
Jithu Raphel
,
Vinod P
International Conference on Contemporary…
2015
Corpus ID: 17955019
The proposed non-signature based system creates a meta feature space for the detection of metamorphic malware samples where three…
Expand
2012
2012
Intra-procedural Path-insensitve Grams (I-GRAMS) and Disassembly Based Features for Packer Tool Classification and Detection
Scott E Gerics
2012
Corpus ID: 54906188
Abstract : The DoD relies on over seven million computing devices worldwide to accomplish a wide range of goals and missions…
Expand
2012
2012
Optimal Based Damping Controllers of Unified Power Flow Controller Using Adaptive Tabu Search
Rungnapa Taithai
,
A. Oonsivilai
2012
Corpus ID: 28071054
This paper presents optimal based damping controllers of Unified Power Flow Controller (UPFC) for improving the damping power…
Expand
2009
2009
Case Studies in Management and Marketing: Critical Thinking, Public Relations and Integrated Business Topics
Thomas M. Schmidt
,
D. Sc.
,
D. Hsu
,
Instru
2009
Corpus ID: 111914004
Researchers at Harvard University, Cranfield Univer sity and Thunderbird University have published extensively on case studies…
Expand
2007
2007
The Use of Malware Analysis in Support of Law Enforcement CERT ® Coordination Center
Nicholas Ianelli
,
R. Kinder
2007
Corpus ID: 29072380
One of the fundamental challenges to internet security is the use of technology to attack computer systems and steal the assets…
Expand
2003
2003
How to regulate heterogenous hospitals
B. Dormont
,
Carine Milcent
2003
Corpus ID: 56046472
Ways to regulate French public hospitals? The purpose of this paper is to study hospital costs in the event of introduction of a…
Expand
2003
2003
The Making of a Spam Zombie Army: Dissecting the Sobig Worms
Elias Levy
IEEE Security and Privacy
2003
Corpus ID: 3506742
On 25 June 2003, a new mass-mailing worm, Sobig.E, emerged. The worm was highly successful at infecting computer systems. It is…
Expand
2000
2000
STRIPPING DOWN AN AV ENGINE
Igor Muttik
2000
Corpus ID: 5177621
The complexity of anti-virus software has grown enormously over the last five years. The methods used to detect viruses have…
Expand
1996
1996
Application of Differential Forms to Construction of Nonlocal Symmetries
S. Agafonov
1996
Corpus ID: 55765947
Abstract Differential forms are used for construction of nonlocal symmetries of partial differential equations with conservation…
Expand
1988
1988
Interaction of particulate and transformation toughening
J. Amazigo
,
B. Budiansky
1988
Corpus ID: 51834585
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE