Sciweavers

28 search results - page 6 / 6
» Controling The False Positive Detection Rate In Fuzzy Cluste...
Sort
View
JIPS
2007
223views more  JIPS 2007»
13 years 5 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
CCS
2010
ACM
13 years 5 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
RECSYS
2009
ACM
13 years 11 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick