Sciweavers

655 search results - page 73 / 131
» A behavioral approach to worm detection
Sort
View
KBSE
2009
IEEE
15 years 4 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
VISSYM
2003
14 years 11 months ago
Detecting Critical Regions in Scalar Fields
Trivariate data is commonly visualized using isosurfaces or direct volume rendering. When exploring scalar fields by isosurface extraction it is often difficult to choose isoval...
Gunther H. Weber, Gerik Scheuermann, Bernd Hamann
JSAC
2006
165views more  JSAC 2006»
14 years 9 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ACSAC
2008
IEEE
15 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 3 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna