Next: About this document ...
Up: MEF: Malicious Email Filter
Previous: Software Availability
-
- 1
-
Stephen R. van den Berg, and Philip Guenther. Procmail, Online publication, 2001.
https://www.procmail.org
- 2
-
John Hardin, Enhancing E-Mail Security With Procmail, Online publication, 2000.
https://www.impsec.org/email-tools/procmail-security.html
- 3
-
Jeffrey O. Kephart, and William C. Arnold. Automatic Extraction of
Computer Virus Signatures, 4th Virus Bulletin International
Conference, pages 178-184, 1994.
- 4
-
Kohavi, R. A study of cross-validation and bootstrap for accuracy
estimation and model selection, IJCAI, 1995.
- 5
-
MacAfee. Homepage - MacAfee.com, Online publication, 2000. https://www.mcafee.com
- 6
-
MEF Group, Malicious Email Filter Group, Online publication, 2000.
https://www.cs.columbia.edu/ids/mef/
- 7
-
D.Michie, D.J.Spiegelhalter, and C.C.Taylor. Machine learning of rules and trees. In Machine Learning, Neural and Statistical Classification, Ellis Horwood, New York, pages 50-83,1994.
- 8
-
Peter Miller. Hexdump, Online publication, 2000.
https://www.pcug.org.au/ millerp/hexdump.html
- 9
-
Ronald L. Rivest. The MD5 Message Digest Algorithm, Internet RFC 1321, April 1992
- 10
-
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo. Data Mining
Methods for Detection of New Malicious Executables. To appear in IEEE Symposium
on Security and Privacy, Oakland, CA, May 2001
- 11
-
Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold,
David M. Chess, and John F. Morar. Anatomy of a Commercial-Grade
Immune System, IBM Research White Paper, 1999.
https://www.av.ibm.com/ScientificPapers/White/
Anatomy/anatomy.html
- 12
- Wildlist Organization. Virus description of viruses in the
wild. Online Publication, 2000. https://www.f-secure.com/virus-info/wild.html
- 13
-
Zou KH, Hall WJ, and Shapiro D. Smooth non-parametric ROC curves for
continuous diagnostic tests, Statistics in Medicine, 1997
Matthew G. Schultz
2001-05-01