Sciweavers

817 search results - page 73 / 164
» Malware behaviour analysis
Sort
View
JDCTA
2010
111views more  JDCTA 2010»
14 years 6 months ago
A Conceptual Representation of Consumer's Group Knowledge and the Possible Role of New Technologies
The purpose of this article is to encourage research on the aspects of consumer behaviour, particularly as found in groups of consumers. For both researchers and practitioners, co...
Massimo Franco, Francesca Di Virgilio, Loredana Di...
NSPW
2006
ACM
15 years 5 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 12 months ago
A Non-Null Annotation Inferencer for Java Bytecode
We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completen...
Laurent Hubert
BMCBI
2006
205views more  BMCBI 2006»
14 years 12 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 5 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond