Sciweavers

5 search results - page 1 / 1
» Detection of Spyware by Mining Executable Files
Sort
View
IEEEARES
2010
IEEE
13 years 10 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
IPPS
2007
IEEE
13 years 11 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
13 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 5 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
13 years 10 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...