Sciweavers

14 search results - page 2 / 3
» A quantitative study of accuracy in system call-based malwar...
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
13 years 11 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
MOBISYS
2008
ACM
14 years 4 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
RAID
2010
Springer
13 years 2 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ISMAR
2002
IEEE
13 years 9 months ago
Visual Marker Detection and Decoding in AR Systems: A Comparative Study
Visual markers are widely used in existing augmented reality (AR) applications [7, 12, 11, 19]. In most of such applications, the performance of an AR system depends highly on the...
Xiang Zhang, Stephan Fronz, Nassir Navab
INFOCOM
2011
IEEE
12 years 8 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang