Sciweavers

1629 search results - page 157 / 326
» Infeasible Code Detection
Sort
View
WWW
2009
ACM
15 years 10 months ago
Detecting soft errors by redirection classification
A soft error redirection is a URL redirection to a page that returns the HTTP status code 200 (OK) but has actually no relevant content to the client request. Since such redirecti...
Taehyung Lee, Jinil Kim, Jin Wook Kim, Sung-Ryul K...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICANN
2009
Springer
15 years 4 months ago
Algorithms for Structural and Dynamical Polychronous Groups Detection
Polychronization has been proposed as a possible way to investigate the notion of cell assemblies and to understand their role as memory supports for information coding. In a spiki...
Régis Martinez, Hélène Paugam...
ICASSP
2008
IEEE
15 years 4 months ago
A detection algorithm for zero-quantized DCT coefficients in JPEG
The discrete cosine transform (DCT) is widely used in image/video coding standards. However, since most DCT coefficients will be quantized to zeros, a large number of redundant co...
Jin Li, Jarmo Takala, Moncef Gabbouj, Hexin Chen