Sciweavers

4511 search results - page 569 / 903
» Observation Based System Security
Sort
View
WSC
1997
15 years 6 months ago
Structured Models and Dynamic Systems Analysis: The Integration of the IDEF0/IDEF3 Modeling Methods and Discrete Event Simulatio
The role of modeling and simulation is receiving much press of late. However, the lack of practice in employing a link between the two is alarming. A static model is used to under...
Larry Whitman, Brian L. Huff, Adrien Presley
ATAL
2007
Springer
15 years 10 months ago
Multiagent learning in adaptive dynamic systems
Classically, an approach to the multiagent policy learning supposed that the agents, via interactions and/or by using preliminary knowledge about the reward functions of all playe...
Andriy Burkov, Brahim Chaib-draa
ACSAC
2008
IEEE
15 years 11 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 11 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
141
Voted
DIMVA
2006
15 years 6 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...