Malware Detection 2007

Part I / Overview

Part II / Software Analysis and Assurance

Part III / Distributed Threat Detection and Defense

Part IV / Stealthy and Targeted Threat Detection and Defense

Part V / Novel Techniques for Constructing Trustworthy Services