Sciweavers

655 search results - page 39 / 131
» A behavioral approach to worm detection
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
82
Voted
IROS
2008
IEEE
185views Robotics» more  IROS 2008»
15 years 4 months ago
A clickable world: Behavior selection through pointing and context for mobile manipulation
— We present a new behavior selection system for human-robot interaction that maps virtual buttons overlaid on the physical environment to the robot’s behaviors, thereby creati...
Hai Nguyen, Advait Jain, Cressel D. Anderson, Char...
SASO
2008
IEEE
15 years 4 months ago
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems
Market-based mechanisms can be used to coordinate self-interested multi-robot systems in fully distributed environments, where by self-interested we mean that each robot agent att...
MyungJoo Ham, Gul A. Agha
64
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards
— It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as wel...
Giuseppe Bianchi, Antonio Di Stefano, Costantino G...
ECBS
2000
IEEE
97views Hardware» more  ECBS 2000»
15 years 2 months ago
Ensuring Structure and Behavior Correctness in Design Composition
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan