next up previous
Next: About this document ... Up: MEF: Malicious Email Filter Previous: 8. Software Availability

Bibliography

1
D.Michie, D.J.Spiegelhalter, and C.C.Taylor.
Machine learning of rules and trees.
Ellis Horwood, 1994.

2
MEF Group.
Malicious Email Filter Group.
Published as Online publication, 2001.
http://www.cs.columbia.edu/ids/mef.

3
John Hardin.
Enhancing E-Mail Security With Procmail.
Online publication, 2001.
http://www.impsec.org/email-tools/procmail-security.html.

4
Jeffrey O. Kephart and William C. Arnold.
Automatic Extraction of Computer Virus Signatures.
4th Virus Bulletin International Conference, pages pages 178-184, 1994.

5
R Kohavi.
A study of cross-validation and bootstrap for accuracy estimation and model selection.
IJCAI, 1995.

6
MacAfee.
Homepage - MacAfee.com.
Published as Online publication, 2001.
http://www.mcafee.com.

7
Peter Miller.
Hexdump.
Published as Online publication, 2001.
http://www.pcug.org.au/ millerp/hexdump.html.

8
Wildlist Organization.
Virus description of viruses in the wild.
Published as Online Publication, 2001.
http://www.f-secure.com/virus-info/wild.html.

9
Ronald L. Rivest.
The MD5 Message Digest Algorithm.
Published as Internet RFC 1321, April 1992.

10
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo.
Data Mining Methods for Detection of New Malicious Executables.
To appear in IEEE Symposium on Security and Privacy, May 2001.

11
Stephen R. van den Berg and Philip Guenther.
Procmail.
Online publication, 2001.
http://www.procmail.org.

12
Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, and John F. Morar.
Anatomy of a Commercial-Grade Immune System.
IBM Research White Paper, 1999.
http://www.av.ibm.com/ScientificPapers/White/
Anatomy/anatomy.html.

13
KH Zou, WJ Hall, and D Shapiro.
Smooth non-parametric ROC curves for continuous diagnostic tests.
Statistics in Medicine, 1997.



Erez Zadok
2001-05-14