Sciweavers

1109 search results - page 125 / 222
» Towards an analysis of dynamic environments
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 12 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
SOCINFO
2010
14 years 8 months ago
Dynamic Context-Sensitive PageRank for Expertise Mining
Abstract. Online tools for collaboration and social platforms have become omnipresent in Web-based environments. Interests and skills of people evolve over time depending in perfor...
Daniel Schall, Schahram Dustdar
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 7 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
PLDI
2009
ACM
15 years 4 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 1 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...