Sciweavers

88 search results - page 17 / 18
» A study of mass-mailing worms
Sort
View
SCAM
2006
IEEE
15 years 3 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...
SYNASC
2005
IEEE
97views Algorithms» more  SYNASC 2005»
15 years 3 months ago
A Reinforcement Learning Algorithm for Spiking Neural Networks
The paper presents a new reinforcement learning mechanism for spiking neural networks. The algorithm is derived for networks of stochastic integrate-and-fire neurons, but it can ...
Razvan V. Florian
ASPLOS
2006
ACM
15 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
WS
2004
ACM
15 years 3 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala