What's in the news? Using news sentiment momentum for tactical asset allocation

MW Uhl, M Pedersen, O Malitius - The Journal of Portfolio …, 2015 - jpm.pm-research.com
News and news sentiment often influence financial markets and asset prices. Investors
commonly recognize this, but only a few studies have used news sentiment in news to predict …

Mining specifications of malicious behavior

M Christodorescu, S Jha, C Kruegel - … of the the 6th joint meeting of the …, 2007 - dl.acm.org
… In other words, we mine the malicious behavior present in a … Since our algorithm provides
a succinct description of malicious … is effective in extracting malicious behaviors that can be …

Detection of malicious code variants based on deep learning

Z Cui, F Xue, X Cai, Y Cao, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
malicious code families and more than 10 000 malicious codes have been reported. This
growth has posed a challenge for malicious … protection, uncovering malicious code variants is …

Dynamic analysis of malicious code

U Bayer, A Moser, C Kruegel, E Kirda - Journal in Computer Virology, 2006 - Springer
… step to be able to develop effective detection techniques for malicious code. In addition, it is
an … by malicious code. Also, our tool runs binaries in an unmodified Windows environment, …

[HTML][HTML] Static analysis of executables to detect malicious patterns

M Christodorescu, S Jha - 12th USENIX Security Symposium (USENIX …, 2003 - usenix.org
… a unique viewpoint on malicious code detection. We regard malicious code detection as an
… Next we are given an obfuscated version O(V ) of the virus. The problem is to find whether …

Prophiler: a fast filter for the large-scale detection of malicious web pages

D Canali, M Cova, G Vigna, C Kruegel - … of the 20th international …, 2011 - dl.acm.org
… money involves the installation of malicious software on a large … Malicious web content has
become one of the most effective mechanisms for cyber criminals to distribute malicious code…

SEIRS epidemic model with delay for transmission of malicious objects in computer network

BK Mishra, DK Saini - Applied mathematics and computation, 2007 - Elsevier
malicious objects in the computer network is formulated, with death rate other than attack of
malicious … on continuous run by anti malicious software spread malicious objects. Latent and …

Data mining methods for detection of new malicious executables

MG Schultz, E Eskin, F Zadok… - Proceedings 2001 IEEE …, 2000 - ieeexplore.ieee.org
malicious executables, especially neH: unseen malicious executables often arriving as eniail
attachments. These new malicious … to detect these new malicious programs with heuristics …

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey

A Shabtai, R Moskovitch, Y Elovici, C Glezer - information security technical …, 2009 - Elsevier
… of new malicious code … malicious code in executable files can be designed to achieve very
high accuracy while maintaining low false positives (ie misclassifying benign files as malicious

[PDF][PDF] Static detection of malicious code in executable programs

J Bergeron, M Debbabi, J Desharnais, MM Erhioui… - Int. J. of Req …, 2001 - academia.edu
… As malicious code can affect the data and control flow of a … of static detection of malicious
code in binary executables. The … for the static detection of malicious code. The rest of the paper …