Sciweavers

1186 search results - page 153 / 238
» A New Approach to Secure Logging
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 4 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
123
Voted
ICPR
2010
IEEE
14 years 10 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
204
Voted
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
16 years 2 months ago
Unordered Tree Mining with Applications to Phylogeny
Frequent structure mining (FSM) aims to discover and extract patterns frequently occurring in structural data, such as trees and graphs. FSM finds many applications in bioinformat...
Dennis Shasha, Jason Tsong-Li Wang, Sen Zhang
96
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 1 months ago
Efficiently mining frequent trees in a forest
Mining frequent trees is very useful in domains like bioinformatics, web mining, mining semi-structured data, and so on. We formulate the problem of mining (embedded) subtrees in ...
Mohammed Javeed Zaki
ISDA
2009
IEEE
15 years 7 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy