The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
Any model of the world a robot constructs on the basis of its sensor data is necessarily both incomplete, due to the robot's limited window on the world, and uncertain, due t...
A new data-driven approach to atmospheric sensing and detecting/ predicting hazardous atmospheric phenomena is presented. Dense networks of small high-resolution radars are deploye...
Jerry Brotzge, V. Chandresakar, Kelvin Droegemeier...