Sciweavers

1122 search results - page 91 / 225
» Behavioral Extensions of Institutions
Sort
View
WISEC
2010
ACM
15 years 4 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
CCS
2007
ACM
15 years 4 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
ATAL
2008
Springer
14 years 12 months ago
Evolutionary dynamics for designing multi-period auctions
Mechanism design (MD) has recently become a very popular approach in the design of distributed systems of autonomous agents. A key assumption required for the application of MD is...
Tomas Klos, Gerrit Jan van Ahee
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
13 years 5 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
WWW
2004
ACM
15 years 10 months ago
Cooperative middleware specialization for service oriented architectures
Service-oriented architectures (SOA) will provide the basis of the next generation of distributed software systems, and have already gained enormous traction in the industry throu...
Nirmal Mukhi, Ravi B. Konuru, Francisco Curbera