Sciweavers

99 search results - page 9 / 20
» Detecting metamorphic malwares using code graphs
Sort
View
AMAI
2004
Springer
15 years 3 months ago
Symmetry Breaking in Constraint Satisfaction with Graph-Isomorphism: Comma-Free Codes
In this paper the use of graph isomorphism is investigated within the framework of symmetry breaking in constraint satisfaction problems. A running example of Comma-free codes is ...
Justin Pearson
METRICS
2002
IEEE
15 years 2 months ago
Gemini: Maintenance Support Environment Based on Code Clone Analysis
Maintaining software systems is getting more complex and difficult task, as the scale becomes larger. It is generally said that code clone is one of the factors that make softwar...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 2 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
IEEEARES
2010
IEEE
15 years 4 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
INTELLCOMM
2004
Springer
15 years 3 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...