Sciweavers

2269 search results - page 188 / 454
» Behavioral Intrusion Detection
Sort
View
SASO
2008
IEEE
15 years 11 months ago
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems
Market-based mechanisms can be used to coordinate self-interested multi-robot systems in fully distributed environments, where by self-interested we mean that each robot agent att...
MyungJoo Ham, Gul A. Agha
AADEBUG
2005
Springer
15 years 10 months ago
Debugging object-oriented programs with behavior views
A complex software system may perform many program tasks during execution to provide the required functionalities. To detect and localize bugs related to the implementation of the...
Donglin Liang, Kai Xu 0002
ESWA
2007
127views more  ESWA 2007»
15 years 4 months ago
An anticipation model of potential customers' purchasing behavior based on clustering analysis and association rules analysis
This paper proposes an anticipation model of potential customers’ purchasing behavior. This model is inferred from past purchasing behavior of loyal customers and the web server...
Horng-Jinh Chang, Lun-Ping Hung, Chia-Ling Ho
JCS
2011
138views more  JCS 2011»
14 years 7 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
EUROSYS
2008
ACM
16 years 2 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos