Sciweavers

1804 search results - page 289 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICTAI
2008
IEEE
15 years 10 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
CCS
2009
ACM
15 years 11 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
DEXAW
2006
IEEE
127views Database» more  DEXAW 2006»
15 years 10 months ago
History Checking of XML Data Streams
Besides being adopted as the new general data representation format for the Internet, XML is finding increasing acceptance as a native data exchange language. In order to fully e...
Alessandro Campi, Paola Spoletini
ICPR
2010
IEEE
15 years 9 months ago
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video
In this paper, we develop a neurobiologicallymotivated statistical method for video analysis that simultaneously searches the combined motion and form space in a concerted and ef...
Ricky Sethi, Amit Roy-Chowdhury
143
Voted
BMCBI
2010
132views more  BMCBI 2010»
15 years 4 months ago
Parallel multiplicity and error discovery rate (EDR) in microarray experiments
Background: In microarray gene expression profiling experiments, differentially expressed genes (DEGs) are detected from among tens of thousands of genes on an array using statist...
Wayne Wenzhong Xu, Clay J. Carter