Sciweavers

1804 search results - page 130 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EUC
2008
Springer
15 years 5 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima
OOPSLA
2007
Springer
15 years 10 months ago
Synthesizing reactive systems from LSC requirements using the play-engine
Live Sequence Charts (LSCs) is a scenario-based language for modeling object-based reactive systems with liveness properties. A tool called the Play-Engine allows users to create ...
Hillel Kugler, Cory Plock, Amir Pnueli
DIMVA
2008
15 years 5 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
130
Voted
DANTE
1999
IEEE
144views Database» more  DANTE 1999»
15 years 8 months ago
Issues in Using Specifications to Improve Content-Based Search of Multimedia Data
Many current multimedia database management systems perform content-based retrieval of images by extracting the values of various features from every object stored in their system...
Leonard Brown, Le Gruenwald, Gregory D. Speegle
CCGRID
2004
IEEE
15 years 8 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann