Sciweavers

8 search results - page 1 / 2
» Audit File Reduction Using N-Gram Models
Sort
View
DIMVA
2008
13 years 6 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
FC
2005
Springer
93views Cryptology» more  FC 2005»
13 years 10 months ago
Audit File Reduction Using N-Gram Models
Fernando Godínez, Dieter Hutter, Raul Monro...
ISMIS
2005
Springer
13 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ICMCS
2005
IEEE
158views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Processor Load Analysis for Mobile Multimedia Streaming: The Implication of Power Reduction
The software codec on mobile device introduces significant power consumption because the energy efficiency of general processor based system is much lower than that of the dedicat...
Min Li, Xiaobo Wu, Zihua Guo, Richard Yao, Xiaolan...
ICFEM
2009
Springer
13 years 11 months ago
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Péter Bokor, Marco Serafini, Neeraj Suri, H...