Sciweavers

413 search results - page 31 / 83
» Investigating User Browsing Behavior
Sort
View
NDSS
2009
IEEE
15 years 8 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
HUC
2010
Springer
14 years 12 months ago
Exploring inter-child behavioral relativity in a shared social environment: a field study in a kindergarten
A kindergarten is an interesting community of young children. The children continuously share their interactions and experiences, and grow along similar developmental stages. In t...
Inseok Hwang, Hyukjae Jang, Lama Nachman, Junehwa ...
EPEW
2007
Springer
15 years 8 months ago
Towards an Automatic Modeling Tool for Observed System Behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of capa...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
DIMVA
2007
15 years 3 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
PE
2010
Springer
124views Optimization» more  PE 2010»
14 years 8 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...