Sciweavers

1585 search results - page 182 / 317
» A framework for computer-aided validation
Sort
View
153
Voted
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 10 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
138
Voted
IMC
2009
ACM
15 years 10 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
109
Voted
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
15 years 10 months ago
Learning by Propagability
In this paper, we present a novel feature extraction framework, called learning by propagability. The whole learning process is driven by the philosophy that the data labels and o...
Bingbing Ni, Shuicheng Yan, Ashraf A. Kassim, Loon...
145
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
131
Voted
SECON
2008
IEEE
15 years 10 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao