Sciweavers

817 search results - page 18 / 164
» Malware behaviour analysis
Sort
View
CCR
2004
80views more  CCR 2004»
14 years 11 months ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson
ACSAC
2005
IEEE
15 years 5 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
CCS
2011
ACM
13 years 11 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
ICPR
2008
IEEE
16 years 29 days ago
Analysis of human behaviour in front of a target scene
In this paper we present an application of computer vision techniques to obtain specific information about the behaviour of the people passing in front of a target scene. This is ...
Adel Lablack, Chabane Djeraba
LREC
2010
156views Education» more  LREC 2010»
15 years 1 months ago
Heterogeneous Sensor Database in Support of Human Behaviour Analysis in Unrestricted Environments: The Audio Part
In the present paper we report on a recent effort that resulted in the establishment of a unique multimodal database, referred to as the PROMETHEUS database. This database was cre...
Stavros Ntalampiras, Todor Ganchev, Ilyas Potamiti...