Sciweavers

1629 search results - page 153 / 326
» Infeasible Code Detection
Sort
View
AINA
2009
IEEE
15 years 5 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
ICSM
2009
IEEE
15 years 4 months ago
Detecting virus mutations via dynamic matching
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...
Min Feng, Rajiv Gupta
IEEEARES
2008
IEEE
15 years 4 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
AVSS
2007
IEEE
15 years 4 months ago
Detecting shopper groups in video sequences
We present a generalized extensible framework for automated recognition of swarming activities in video sequences. The trajectory of each individual is produced by the visual trac...
Alex Leykin, Mihran Tuceryan
ISMAR
2002
IEEE
15 years 3 months ago
Visual Marker Detection and Decoding in AR Systems: A Comparative Study
Visual markers are widely used in existing augmented reality (AR) applications [7, 12, 11, 19]. In most of such applications, the performance of an AR system depends highly on the...
Xiang Zhang, Stephan Fronz, Nassir Navab