Sciweavers

2499 search results - page 397 / 500
» The Serializability of Network Codes
Sort
View
NDSS
2009
IEEE
15 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
CNHPCA
2009
Springer
15 years 4 months ago
Benchmarking Parallel I/O Performance for a Large Scale Scientific Application on the TeraGrid
This paper is a report on experiences in benchmarking I/O performance on leading computational facilities on the NSF TeraGrid network with a large scale scientific application. In...
Frank Löffler, Jian Tao, Gabrielle Allen, Eri...
SERSCISA
2009
Springer
15 years 4 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
DSN
2008
IEEE
15 years 4 months ago
Using likely program invariants to detect hardware errors
In the near future, hardware is expected to become increasingly vulnerable to faults due to continuously decreasing feature size. Software-level symptoms have previously been used...
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandr...
DSN
2008
IEEE
15 years 4 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...