Sciweavers

12 search results - page 2 / 3
» Malware Detection on Mobile Devices Using Distributed Machin...
Sort
View
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 7 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
IWAN
2004
Springer
13 years 11 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
ACSAC
2006
IEEE
14 years 4 days ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
ICML
2010
IEEE
13 years 6 months ago
FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model
We present an overview of FAB-MAP, an algorithm for place recognition and mapping developed for infrastructure-free mobile robot navigation in large environments. The system allow...
Mark Joseph Cummins, Paul M. Newman
ICAC
2006
IEEE
14 years 4 days ago
Using Autonomic Principles to Manage Converged Services in Next Generation Networks
Network resources will always be heterogeneous, and thus have different functionalities and programming models. This adversely affects interoperability. Seamless Mobility is one e...
John Strassner