Sciweavers

655 search results - page 26 / 131
» A behavioral approach to worm detection
Sort
View
DIMVA
2007
14 years 11 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
WETICE
1999
IEEE
15 years 1 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
ICIP
2009
IEEE
15 years 10 months ago
Detecting Contextual Anomalies Of Crowd Motion In Surveillance Video
Many works have been proposed on detecting individual anomalies in crowd scenes, i.e., human behaviors anomalous with respect to the rest of the behaviors. In this paper, we intro...

Publication
313views
14 years 10 months ago
Visual Surveillance: Dynamic Behavior Analysis at Multiple Levels
New cameras are installed daily all around the world. Hence it becomes increasingly important to develop methods for reducing the manual effort that is still required for video ana...
Michael D. Breitenstein
INFOCOM
2009
IEEE
15 years 4 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem