Sciweavers

655 search results - page 34 / 131
» A behavioral approach to worm detection
Sort
View
EURODAC
1994
IEEE
145views VHDL» more  EURODAC 1994»
15 years 1 months ago
Testability analysis and improvement from VHDL behavioral specifications
This paper presents a testability improvement method for digital systems described in VHDL behavioral specification. The method is based on testability analysis at registertransfe...
Xinli Gu, Krzysztof Kuchcinski, Zebo Peng
ICASSP
2010
IEEE
14 years 10 months ago
Sparsity-cognizant overlapping co-clustering for behavior inference in social networks
Co-clustering can be viewed as a two-way (bilinear) factorization of a large data matrix into dense/uniform and possibly overlapping submatrix factors (co-clusters). This combinat...
Hao Zhu, Gonzalo Mateos, Georgios B. Giannakis, Ni...
NOMS
2008
IEEE
15 years 4 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
BILDMED
2009
130views Algorithms» more  BILDMED 2009»
14 years 10 months ago
Feature Processing for Automatic Anatomical Landmark Detection Using Reservoir Networks
We present an approach to the combination of an arbitrary number of image features to produce more sophisticated features for anatomical landmark detection. The combination was don...
Benjamin Roeschies, Susanne Winter
ACSAC
2003
IEEE
15 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...