Sciweavers

36 search results - page 6 / 8
» A Framework for Modelling Trojans and Computer Virus Infecti...
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 1 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
BMCBI
2006
114views more  BMCBI 2006»
13 years 7 months ago
Epigenetic acquisition of inducibility of type III cytotoxicity in P. aeruginosa
Background: Pseudomonas aeruginosa, an opportunistic pathogen, is often encountered in chronic lung diseases such as cystic fibrosis or chronic obstructive pneumonia, as well as a...
Didier Filopon, Annabelle Mérieau, Gilles B...
WS
2006
ACM
14 years 1 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
BMCBI
2010
156views more  BMCBI 2010»
13 years 7 months ago
Global screening of potential Candida albicans biofilm-related transcription factors via network comparison
Background: Candida albicans is a commonly encountered fungal pathogen in humans. The formation of biofilm is a major virulence factor in C. albicans pathogenesis and is related t...
Yu-Chao Wang, Chung-Yu Lan, Wen-Ping Hsieh, Luis A...