Sciweavers

1183 search results - page 215 / 237
» On flow-sensitive security types
Sort
View
77
Voted
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
SDMW
2009
Springer
15 years 2 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
ACISP
2001
Springer
15 years 2 months ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji
106
Voted
AGENTS
2001
Springer
15 years 2 months ago
An assistive robotic agent for pedestrian mobility
The goal of this project is to develop a pedestrian mobility aid for the elderly. In order for this type of assistive technology to be useful and accepted by its intended user com...
Glenn S. Wasson, James P. Gunderson, Sean Graves, ...
81
Voted
CCS
2001
ACM
15 years 2 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons