Check out the new USENIX Web site. next up previous
Next: About this document ... Up: MEF: Malicious Email Filter Previous: Software Availability

Bibliography

1
Stephen R. van den Berg, and Philip Guenther. Procmail, Online publication, 2001. https://www.procmail.org

2
John Hardin, Enhancing E-Mail Security With Procmail, Online publication, 2000. https://www.impsec.org/email-tools/procmail-security.html

3
Jeffrey O. Kephart, and William C. Arnold. Automatic Extraction of Computer Virus Signatures, 4th Virus Bulletin International Conference, pages 178-184, 1994.

4
Kohavi, R. A study of cross-validation and bootstrap for accuracy estimation and model selection, IJCAI, 1995.

5
MacAfee. Homepage - MacAfee.com, Online publication, 2000. https://www.mcafee.com

6
MEF Group, Malicious Email Filter Group, Online publication, 2000. https://www.cs.columbia.edu/ids/mef/

7
D.Michie, D.J.Spiegelhalter, and C.C.Taylor. Machine learning of rules and trees. In Machine Learning, Neural and Statistical Classification, Ellis Horwood, New York, pages 50-83,1994.

8
Peter Miller. Hexdump, Online publication, 2000. https://www.pcug.org.au/ millerp/hexdump.html

9
Ronald L. Rivest. The MD5 Message Digest Algorithm, Internet RFC 1321, April 1992

10
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo. Data Mining Methods for Detection of New Malicious Executables. To appear in IEEE Symposium on Security and Privacy, Oakland, CA, May 2001

11
Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, and John F. Morar. Anatomy of a Commercial-Grade Immune System, IBM Research White Paper, 1999. https://www.av.ibm.com/ScientificPapers/White/
Anatomy/anatomy.html

12
Wildlist Organization. Virus description of viruses in the wild. Online Publication, 2000. https://www.f-secure.com/virus-info/wild.html

13
Zou KH, Hall WJ, and Shapiro D. Smooth non-parametric ROC curves for continuous diagnostic tests, Statistics in Medicine, 1997



Matthew G. Schultz
2001-05-01