Sciweavers

100 search results - page 3 / 20
» Mining specifications of malicious behavior
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
13 years 10 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
14 years 6 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
14 years 28 days ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
CIDM
2007
IEEE
13 years 6 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
WEBI
2005
Springer
13 years 11 months ago
Real-Time Learning Behavior Mining for e-Learning
Over the last years, we have witnessed an explosive growth of e-learning. More and more learning contents have been published and shared over the Internet. Therefore, how to progr...
Yen-Hung Kuo, Juei-Nan Chen, Yu-Lin Jeng, Yueh-Min...