Sciweavers

320 search results - page 64 / 64
» End-User Software Engineering Position Paper
Sort
View
CCS
2007
ACM
13 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CCS
2010
ACM
13 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CORR
1998
Springer
184views Education» more  CORR 1998»
13 years 4 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...
TASLP
2010
132views more  TASLP 2010»
12 years 11 months ago
Using Reverberation to Improve Range and Elevation Discrimination for Small Array Sound Source Localization
Sound source localization (SSL) is an essential task in many applications involving speech capture and enhancement. As such, speaker localization with microphone arrays has receive...
Flavio Ribeiro, Cha Zhang, Dinei A. F. Florê...
CHI
2011
ACM
12 years 8 months ago
Collaborative creativity: a complex systems model with distributed affect
The study of creativity has received significant attention over the past century, with a recent increase in interest in collaborative, distributed creativity. We posit that creati...
Cecilia R. Aragon, Alison Williams