Sciweavers

817 search results - page 78 / 164
» Malware behaviour analysis
Sort
View
APN
2007
Springer
15 years 6 months ago
Markov Decision Petri Net and Markov Decision Well-Formed Net Formalisms
In this work, we propose two high-level formalisms, Markov Decision Petri Nets (MDPNs) and Markov Decision Well-formed Nets (MDWNs), useful for the modeling and analysis of distrib...
Marco Beccuti, Giuliana Franceschinis, Serge Hadda...
AI
2006
Springer
15 years 3 months ago
Adaptive Fraud Detection Using Benford's Law
Abstract. Adaptive Benford's Law [1] is a digital analysis technique that specifies the probabilistic distribution of digits for many commonly occurring phenomena, even for in...
Fletcher Lu, J. Efrim Boritz, H. Dominic Covvey
LREC
2010
290views Education» more  LREC 2010»
15 years 1 months ago
Non-verbal Signals for Turn-taking and Feedback
This paper concerns non-verbal communication, and describes especially the use of eye-gaze to signal turn-taking and feedback in conversational settings. Eye-gaze supports smooth ...
Kristiina Jokinen
OSDI
2006
ACM
16 years 5 days ago
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management
Mismanagement of the persistent state of a system--all the executable files, configuration settings and other data that govern how a system functions--causes reliability problems,...
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Bra...
CCS
2009
ACM
15 years 6 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...