Sciweavers

817 search results - page 86 / 164
» Malware behaviour analysis
Sort
View
AINA
2010
IEEE
15 years 3 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 12 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...
BIB
2006
84views more  BIB 2006»
14 years 12 months ago
Computational methodologies for modelling, analysis and simulation of signalling networks
This article is a critical review of computational techniques used to model, analyse and simulate signalling networks. We propose a conceptual framework, and discuss the role of s...
David R. Gilbert, Hendrik Fuß, Xu Gu, Richar...
IJSTM
2008
77views more  IJSTM 2008»
14 years 12 months ago
The internal differentiation of the KIBS sector: empirical evidence from cluster analysis
: The sector of Knowledge-Intensive Business Services (KIBS) is characterised by high rates of firm fluctuation, rapid changes in technological progress (e.g., in the software indu...
Daniel Horgos, Andreas Koch
ENVSOFT
2007
78views more  ENVSOFT 2007»
14 years 12 months ago
A multi-model approach to analysis of environmental phenomena
Abstract: This paper introduces a novel data-driven methodology named Evolutionary Polynomial Regression (EPR), which permits the multi-purpose modelling of physical phenomena, thr...
Orazio Giustolisi, Angelo Doglioni, D. A. Savic, B...