Sciweavers

151 search results - page 23 / 31
» Semantics-Aware Malware Detection
Sort
View
91
Voted
SOCIALCOM
2010
14 years 4 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
ICWSM
2010
14 years 11 months ago
Devils, Angels, and Robots: Tempting Destructive Users in Social Media
Social media sites derive their value by providing a popular and dependable community for participants to engage, share, and interact. This community value and related services li...
Kyumin Lee, Brian David Eoff, James Caverlee
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
67
Voted
NDSS
2006
IEEE
15 years 3 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
IWAN
2004
Springer
15 years 2 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood