Sciweavers

619 search results - page 99 / 124
» Coalition detection and identification
Sort
View
84
Voted
ICSE
2008
IEEE-ACM
15 years 10 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
82
Voted
IEEEARES
2009
IEEE
15 years 5 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
96
Voted
BICOB
2009
Springer
15 years 4 months ago
Graph Spectral Approach for Identifying Protein Domains
Here we present a simple method based on graph spectral properties to automatically partition multi-domain proteins into individual domains. The identification of structural domain...
Hari Krishna Yalamanchili, Nita Parekh
73
Voted
IH
2009
Springer
15 years 4 months ago
Microphone Classification Using Fourier Coefficients
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Robert Buchholz, Christian Krätzer, Jana Ditt...
ROBIO
2006
IEEE
156views Robotics» more  ROBIO 2006»
15 years 4 months ago
Abstraction of Odor Source Declaration Algorithm from Moth-Inspired Plume Tracing Strategies
—A moth behavior-inspired strategy, including tracing a chemical plume to its source and declaring the source location, was tested in near shore ocean conditions via a REMUS unde...
Wei Li