Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,625 papers from all fields of science
Search
Sign In
Create Free Account
YARA
YARA is the name of a tool primarily used in malware research and detection. It provides a rule-bused approach to create descriptions of malware…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Boolean expression
Malware
Perl
Regular expression
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Mohamed Belaoued
,
Abdelaziz Boukellal
,
Mohamed Amir Koalal
,
A. Derhab
,
S. Mazouzi
,
F. A. Khan
Int. J. Distributed Sens. Networks
2019
Corpus ID: 208623849
Malware have become the scourge of the century, as they are continuously evolving and becoming more complex with increasing…
Expand
Review
2019
Review
2019
Generation of Static YARA-Signatures Using Genetic Algorithm
Alexander Zhdanov
IEEE European Symposium on Security and Privacy…
2019
Corpus ID: 201067777
This article is dedicated to the subject of malware detection using static YARA-signatures and Genetic Algorithm (GA). It…
Expand
2017
2017
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming
Amrita Milind Honap
,
Wonjun Lee
International Conferences on Information Science…
2017
Corpus ID: 6556054
Kernel Level Rootkits are malwares that can be installed and hidden on a user’s computer without revealing their existence. The…
Expand
2015
2015
Multi-step Attack Pattern Detection on Normalized Event Logs
David Jaeger
,
M. Ussath
,
Feng Cheng
,
C. Meinel
IEEE 2nd International Conference on Cyber…
2015
Corpus ID: 8656383
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many…
Expand
Highly Cited
2012
Highly Cited
2012
THERE ARE WEEKS WHEN DECADES HAPPEN: STRUCTURE AND STRATEGY IN THE EGYPTIAN REVOLUTION
A. Holmes
2012
Corpus ID: 155635941
*† This article analyzes the 2011 uprising in Egypt in order to understand how an entrenched autocratic ruler could be toppled in…
Expand
2010
2010
ELEKTRO ÇEKİM YÖNTEMİ İLE ÜRETİLMİŞ POLİ(VİNİL ALKOL)/SODYUM ALGİNAT NANOLİFLİ YÜZEYİN YARA ÖRTÜSÜ OLARAK IN VIVO DEĞERLENDİRMESİ
G. Üstündağ
,
Esra Karaca
,
Serhat Özbek
,
Ilkin Çavuşoğlu
2010
Corpus ID: 114822432
Bu calismada, elektro cekim yontemi ile elde edilen alginat nanolifli yuzeylerin yara ortusu olarak kullanim potansiyeli…
Expand
2009
2009
Unified Behavior Framework for Reactive Robot Control
Brian G. Woolley
,
Gilbert L. Peterson
J. Intell. Robotic Syst.
2009
Corpus ID: 15236614
Behavior-based systems form the basis of autonomous control for many robots. In this article, we demonstrate that a single…
Expand
2009
2009
Cross-cultural Leadership: the Interaction of Culture, Values, and Leadership Style
R. Danuser
2009
Corpus ID: 157561650
2007
2007
Combined Faculties for the Natural Sciences and for Mathematics of the Ruperto-Carola University of Heidelberg, Germany for the degree of Doctor of Natural Sciences
D. P. Agarwal
2007
Corpus ID: 73188658
Carbon ions deposit most of their energy in a narrow region near the end of their range (Bragg peak). The range of ions in tissue…
Expand
2005
2005
YARA: A Software Framework Enhancing Service Robot Dependability
S. Caselli
,
Francesco Monica
,
M. Reggiani
Proceedings of the IEEE International Conference…
2005
Corpus ID: 2481435
This paper focuses on the role of real-time operation support in mobile robot control architectures for service applications. We…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE