Sciweavers

114 search results - page 3 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
IWIA
2005
IEEE
13 years 10 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
RAID
2010
Springer
13 years 3 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
MICAI
2000
Springer
13 years 8 months ago
Verification of Correct Pronunciation of Mexican Spanish Using Speech Technology
This paper presents a new method for the verification of the correct pronunciation of spoken words. This process is based on speech recognition technology. It can be particularly ...
Ingrid Kirschning, Nancy Aguas
ERLANG
2007
ACM
13 years 9 months ago
A language for specifying type contracts in Erlang and its interaction with success typings
We propose a small extension of the ERLANG language that allows programmers to specify contracts with type information at the level of individual functions. Such contracts are opt...
Miguel Jimenez, Tobias Lindahl, Konstantinos F. Sa...
CEAS
2008
Springer
13 years 7 months ago
A Survey of Modern Spam Tools
Over the past 5 years, spam sending technology has improved dramatically. Static messages sent opportunistically through misconfigured hosts have evolved into dynamically generate...
Henry Stern