Sciweavers

205 search results - page 17 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 5 days ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
ASPLOS
1991
ACM
15 years 3 months ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
ICICS
2004
Springer
15 years 5 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 5 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
BMCBI
2010
153views more  BMCBI 2010»
14 years 12 months ago
Metamotifs - a generative model for building families of nucleotide position weight matrices
Background: Development of high-throughput methods for measuring DNA interactions of transcription factors together with computational advances in short motif inference algorithms...
Matias Piipari, Thomas A. Down, Tim J. P. Hubbard