Sciweavers

1804 search results - page 79 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICARIS
2009
Springer
15 years 4 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
TPDS
2010
113views more  TPDS 2010»
14 years 4 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
BMCBI
2007
102views more  BMCBI 2007»
14 years 10 months ago
A comprehensive system for evaluation of remote sequence similarity detection
Background: Accurate and sensitive performance evaluation is crucial for both effective development of better structure prediction methods based on sequence similarity, and for th...
Yuan Qi, Ruslan Sadreyev, Yong Wang, Bong-Hyun Kim...
HICSS
1994
IEEE
157views Biometrics» more  HICSS 1994»
15 years 2 months ago
A Protein Family Classification Method for Analysis of Large DNA Sequences
A method is described for identification and classification of proteins encoded in large DNA sequences. Previously, an automated system was introduced for the general detection of...
Steven Henikoff, Jorja G. Henikoff
JSAC
2006
89views more  JSAC 2006»
14 years 10 months ago
Robust multiuser detection for multicarrier CDMA systems
Abstract--Multiuser detection (MUD) for code-division multiple-access (CDMA) systems usually relies on some a priori channel estimates, which are obtained either blindly or by usin...
Rensheng Wang, Hongbin Li, Tao Li