Sciweavers

655 search results - page 22 / 131
» A behavioral approach to worm detection
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
14 years 9 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
AIPRF
2008
14 years 11 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
EUSFLAT
2003
107views Fuzzy Logic» more  EUSFLAT 2003»
14 years 11 months ago
Decision-theoretic approaches in fuzzy rule generation for diagnosis and fault detection problems
A typical task in technical fault detection or medical diagnosis problems is to discriminate normal behavior from one or more types of abnormal behavior by means of different meas...
Sebastian Beck, Ralf Mikut, Jens Jäkel, Georg...
SAINT
2008
IEEE
15 years 4 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal
ISW
2007
Springer
15 years 3 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...