Sciweavers

817 search results - page 41 / 164
» Malware behaviour analysis
Sort
View
IWIA
2005
IEEE
15 years 5 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ESORICS
2011
Springer
13 years 11 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
CSC
2006
15 years 1 months ago
Application of a Newly Designed Super Element to Modal Analysis of hollow cylinders
Design and application of super elements in efficient prediction of the structural behaviour in a short time has been one of the research interests in the last decade. A new 16-no...
Mohammad Taghi Ahmadian, Mohammad Bonakdar
AIED
2007
Springer
15 years 3 months ago
Domain-Specific and Domain-Independent Interactive Behaviors in Andes
In this study, students studied two different domains in the same Intelligent Tutoring System, Andes. Analysis of 435 log files from 22 subjects indicated that there are two types ...
Min Chi, Kurt VanLehn
CMS
2010
150views Communications» more  CMS 2010»
15 years 16 hour ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...