Sciweavers

8503 search results - page 1484 / 1701
» Secure Software Architectures
Sort
View
125
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 7 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
INFOCOM
2011
IEEE
14 years 4 months ago
A highly scalable bandwidth estimation of commercial hotspot access points
—WiFi access points that provide Internet access to users have been steadily increasing in urban areas. Different access points differ from one another in terms of services that ...
Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Li...
CSE
2011
IEEE
14 years 19 days ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...
107
Voted
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 1 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 1 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
« Prev « First page 1484 / 1701 Last » Next »