Sciweavers

16 search results - page 1 / 4
» Precise Capacity Analysis in Binary Networks with Multiple C...
Sort
View
DSN
2008
IEEE
13 years 6 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICONIP
2007
13 years 6 months ago
Analysis on Bidirectional Associative Memories with Multiplicative Weight Noise
Abstract. In neural networks, network faults can be exhibited in different forms, such as node fault and weight fault. One kind of weight faults is due to the hardware or software ...
Chi-Sing Leung, Pui-Fai Sum, Tien-Tsin Wong
RAID
2007
Springer
13 years 11 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ICDCS
2008
IEEE
13 years 11 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen