Sciweavers

655 search results - page 71 / 131
» A behavioral approach to worm detection
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
FIW
2007
133views Communications» more  FIW 2007»
14 years 11 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
ICTAI
2006
IEEE
15 years 3 months ago
Outlier Detection Using Random Walks
The discovery of objects with exceptional behavior is an important challenge from a knowledge discovery standpoint and has attracted much attention recently. In this paper, we pre...
H. D. K. Moonesinghe, Pang-Ning Tan
IJON
2008
186views more  IJON 2008»
14 years 9 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
GLOBECOM
2009
IEEE
14 years 7 months ago
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum se...
Wenkai Wang, Husheng Li, Yan Sun, Zhu Han