Sciweavers

8177 search results - page 542 / 1636
» Detecting System Emulators
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 11 months ago
The Effect of Ordered Detection and Antenna Selection on Diversity Gain of Decision Feedback Detector
— The decision feedback detector (DFD) can achieve the high spectral efficiency of a MIMO channel in that it converts the MIMO channel into multiple parallel layers, through whi...
Yi Jiang, Mahesh K. Varanasi
155
Voted
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
146
Voted
SRDS
2003
IEEE
15 years 10 months ago
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
152
Voted
DAWAK
2003
Springer
15 years 10 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...