Mohamed R. Chouchane

According to our database1, Mohamed R. Chouchane authored at least 5 papers between 2005 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Constructing malware normalizers using term rewriting.
J. Comput. Virol., 2008

Using Markov chains to filter machine-morphed variants of malicious programs.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2006
Using engine signature to detect metamorphic malware.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Normalizing Metamorphic Malware Using Term Rewriting.
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006

2005
Analyzing Memory Accesses in Obfuscated x86 Executables.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...