Sciweavers

64 search results - page 11 / 13
» A Constructive Method for Exploiting Code Motion
Sort
View
CCS
2007
ACM
14 years 1 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 5 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
CVPR
2009
IEEE
15 years 2 months ago
Recognising Action as Clouds of Space-Time Interest Points
Much of recent action recognition research is based on space-time interest points extracted from video using a Bag of Words (BOW) representation. It mainly relies on the discrimi...
Matteo Bregonzio (Queen Mary, University of London...
CHI
2004
ACM
14 years 7 months ago
Two-handed interaction on a tablet display
A touchscreen can be overlaid on a tablet computer to support asymmetric two-handed interaction in which the non-preferred hand operates the touchscreen and the preferred hand use...
Ka-Ping Yee
ICC
2007
IEEE
14 years 1 months ago
A Novel Transmitter-Based Selective-Precoding Technique for DS/CDMA Systems
— In this paper a new transmitter precoding technique is presented that outperforms conventional precoding by making use of a portion of the interference between the users in a C...
Christos Masouros, Emad Alsusa