Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Comprehending and verifying agent system behavior is an arduous task when dealing with complex multiagent systems whose behaviors are sophisticated. This paper presents an approac...
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
We introduce a new paradigm for automatic medical image analysis that adopts concepts from the field of Artificial Life. Our approach prescribes deformable organisms, autonomous ag...
Ghassan Hamarneh, Tim McInerney, Demetri Terzopoul...