Sciweavers

4285 search results - page 91 / 857
» Differential Behavioral Analysis
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
ASPDAC
2009
ACM
155views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Variation-aware resource sharing and binding in behavioral synthesis
— As technology scales, the delay uncertainty caused by process variations has become increasingly pronounced in deep submicron designs. In the presence of process variations, wo...
Feng Wang 0004, Yuan Xie, Andres Takach
ACISICIS
2010
IEEE
14 years 11 months ago
Temporal Dynamics in Music Listening Behavior: A Case Study of Online Music Service
Abstract--Although temporal context may significantly affect the popularity of items and user preference over items, traditional information filtering techniques such as recommende...
Chan Ho Park, Minsuk Kahng
64
Voted
HCI
2007
14 years 11 months ago
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships
This paper describes a hybrid methodology to study users in ongoing relationships based on three levels of user data analysis. Most user-centered design methods are ideal for the a...
Enric Mor, Muriel Garreta Domingo, Julià Mi...
IWSEC
2010
Springer
14 years 8 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo