Sciweavers

1013 search results - page 147 / 203
» Storage-Based Intrusion Detection
Sort
View
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
131
Voted
JPDC
2006
129views more  JPDC 2006»
15 years 3 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
AINA
2009
IEEE
15 years 10 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
TSMC
2008
167views more  TSMC 2008»
15 years 2 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...
DISCEX
2003
IEEE
15 years 8 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt