Sciweavers

13 search results - page 2 / 3
» virology 2008
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 3 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
VIROLOGY
2010
128views more  VIROLOGY 2010»
13 years 3 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...
VIROLOGY
2008
84views more  VIROLOGY 2008»
13 years 5 months ago
Formal affordance-based models of computer virus reproduction
We present a novel classification of computer viruses using a formalised notion of reproductive models based on Gibson's theory of affordances. A computer virus reproduction ...
Matt Webster, Grant Malcolm
VIROLOGY
2008
87views more  VIROLOGY 2008»
13 years 5 months ago
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)
OpenDocument and Open XML are both new open file formats for office documents. OpenDocument is an ISO standard, promoted by OpenOffice.org and Sun StarOffice. Open XML is the new f...
Philippe Lagadec
VIROLOGY
2008
68views more  VIROLOGY 2008»
13 years 5 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...