Mark Stamp
Mark Stamp
Professor of Computer Science, San Jose State University
Verified email at sjsu.edu - Homepage
Title
Cited by
Cited by
Year
Information security: principles and practice
M Stamp
John Wiley & Sons, 2011
6692011
An algorithm for the k-error linear complexity of binary sequences with period 2/sup n
M Stamp, CF Martin
IEEE Transactions on Information Theory 39 (4), 1398-1401, 1993
2841993
Hunting for metamorphic engines
W Wong, M Stamp
Journal in Computer Virology 2 (3), 211-229, 2006
2832006
A revealing introduction to hidden Markov models
M Stamp
Department of Computer Science San Jose State University, 26-56, 2004
2472004
Handbook of information and communication security
P Stavroulakis, M Stamp
Springer Science & Business Media, 2010
1682010
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, F Di Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13 (1), 1-12, 2017
1602017
Opcode graph similarity and metamorphic detection
N Runwal, RM Low, M Stamp
Journal in computer virology 8 (1-2), 37-52, 2012
1602012
Hunting for undetectable metamorphic viruses
D Lin, M Stamp
Journal in computer virology 7 (3), 201-214, 2011
1292011
Applied cryptanalysis: breaking ciphers in the real world
M Stamp, RM Low
John Wiley & Sons, 2007
1292007
Profile hidden Markov models and metamorphic virus detection
S Attaluri, S McGhee, M Stamp
Journal in computer virology 5 (2), 151-169, 2009
1182009
Structural entropy and metamorphic malware
D Baysa, RM Low, M Stamp
Journal of computer virology and hacking techniques 9 (4), 179-192, 2013
1112013
Deriving common malware behavior through graph clustering
Y Park, DS Reeves, M Stamp
Computers & Security 39, 419-430, 2013
1022013
Chi-squared distance and metamorphic virus detection
AH Toderici, M Stamp
Journal of Computer Virology and Hacking Techniques 9 (1), 1-14, 2013
1002013
Hidden Markov models for malware classification
C Annachhatre, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11 (2), 59-73, 2015
912015
Exploring hidden markov models for virus analysis: a semantic approach
TH Austin, E Filiol, S Josse, M Stamp
2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013
842013
Metamorphic worm that carries its own morphing engine
SM Sridhara, M Stamp
Journal of Computer Virology and Hacking Techniques 9 (2), 49-58, 2013
832013
Risks of monoculture
M Stamp
Communications of the ACM 47 (3), 120, 2004
822004
Simple substitution distance and metamorphic detection
G Shanmugam, RM Low, M Stamp
Journal of Computer Virology and Hacking Techniques 9 (3), 159-170, 2013
782013
Introduction to machine learning with applications in information security
M Stamp
CRC Press, 2017
702017
Digital rights management: the technology behind the hype.
M Stamp
J. Electron. Commerce Res. 4 (3), 102-112, 2003
652003
The system can't perform the operation now. Try again later.
Articles 1–20