Sciweavers

817 search results - page 43 / 164
» Malware behaviour analysis
Sort
View
ECIR
2008
Springer
15 years 1 months ago
Using Clicks as Implicit Judgments: Expectations Versus Observations
Abstract. Clickthrough data has been the subject of increasing popularity as an implicit indicator of user feedback. Previous analysis has suggested that user click behaviour is su...
Falk Scholer, Milad Shokouhi, Bodo Billerbeck, And...
CODES
2010
IEEE
14 years 9 months ago
Worst-case performance analysis of synchronous dataflow scenarios
Synchronous Dataflow (SDF) is a powerful analysis tool for regular, cyclic, parallel task graphs. The behaviour of SDF graphs however is static and therefore not always able to ac...
Marc Geilen, Sander Stuijk
VTC
2007
IEEE
135views Communications» more  VTC 2007»
15 years 6 months ago
MBER Turbo Multiuser Beamforming Aided QPSK Receiver Design Using EXIT Chart Analysis
Abstract— This paper studies the mutual information transfer characteristics of a novel iterative soft interference cancellation (SIC) aided beamforming receiver designed for qua...
Shuang Tan, Sheng Chen, Lajos Hanzo
WWW
2010
ACM
15 years 6 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ISW
2009
Springer
15 years 6 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...