Sciweavers

1780 search results - page 2 / 356
» Polymorphic Contention Management
Sort
View
NAR
2008
85views more  NAR 2008»
13 years 5 months ago
Panzea: an update on new content and features
Panzea (http://www.panzea.org), the public web site of the project `Molecular and Functional Diversity in the Maize Genome', has expanded over the past two years in data cont...
Payan Canaran, Edward S. Buckler, Jeffrey Glaubitz...
ICSE
2008
IEEE-ACM
14 years 5 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
SERSCISA
2009
Springer
14 years 1 days ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
CCS
2005
ACM
13 years 11 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...