Sciweavers

1804 search results - page 232 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
84
Voted
RAID
2010
Springer
14 years 8 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
122
Voted
DEXA
2009
Springer
188views Database» more  DEXA 2009»
15 years 2 months ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...
CHI
2010
ACM
15 years 5 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
103
Voted
WWW
2011
ACM
14 years 5 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
82
Voted
IBERAMIA
2004
Springer
15 years 3 months ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...