Sciweavers

817 search results - page 42 / 164
» Malware behaviour analysis
Sort
View
CGF
2004
134views more  CGF 2004»
14 years 11 months ago
An Eye Gaze Model for Dyadic Interaction in an Immersive Virtual Environment: Practice and Experience
This paper describes a behavioural model used to simulate realistic eye-gaze behaviour and body animations for avatars representing participants in a shared immersive virtual envi...
Vinoba Vinayagamoorthy, Maia Garau, Anthony Steed,...
ECOOP
2009
Springer
15 years 6 months ago
Program Metamorphosis
Modern development environments support refactoring by providing atomically behaviour-preserving transformations. While useful, these transformations are limited in three ways: (i)...
Christoph Reichenbach, Devin Coughlin, Amer Diwan
CCGRID
2006
IEEE
15 years 5 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
PASTE
2010
ACM
15 years 4 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
14 years 10 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle