Sciweavers

1225 search results - page 167 / 245
» The Instance Complexity Conjecture
Sort
View
DSN
2008
IEEE
15 years 10 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
ACISP
2008
Springer
15 years 10 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
15 years 10 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang
CSFW
2007
IEEE
15 years 10 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
ICDE
2007
IEEE
179views Database» more  ICDE 2007»
15 years 10 months ago
A New ILP-based Concept Discovery Method for Business Intelligence
In this work, we propose a multi-relational concept discovery method for business intelligence applications. Multi-relational data mining finds interesting patterns that span ove...
Seda Daglar Toprak, Pinar Senkul, Yusuf Kavurucu, ...