Sciweavers

787 search results - page 153 / 158
» Subversion-Resilient Signature Schemes
Sort
View
DIMVA
2008
14 years 11 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
CORR
2007
Springer
153views Education» more  CORR 2007»
14 years 9 months ago
Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks
— We consider a dense fading multi-user network with multiple active multi-antenna source-destination pair terminals communicating simultaneously through a large common set of K ...
Ozgur Oyman, Arogyaswami Paulraj
TCIAIG
2010
14 years 4 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
ECIR
2009
Springer
15 years 6 months ago
Correlation of Term Count and Document Frequency for Google N-Grams
For bounded datasets such as the TREC Web Track (WT10g) the computation of term frequency (TF) and inverse document frequency (IDF) is not difficult. However, when the corpus is th...
Martin Klein, Michael L. Nelson
GLOBECOM
2009
IEEE
15 years 4 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux