Sciweavers

482 search results - page 40 / 97
» A taxonomy of computer worms
Sort
View
PDCAT
2004
Springer
14 years 28 days ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
JCS
2011
138views more  JCS 2011»
12 years 10 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
MDM
2005
Springer
14 years 1 months ago
Concept-based discovery of mobile services
In this paper, we consider semantic service discovery in a global computing environment. We propose creating a dynamic overlay network by grouping together semantically related se...
Chara Skouteli, George Samaras, Evaggelia Pitoura
ICFCA
2007
Springer
14 years 1 months ago
A Parameterized Algorithm for Exploring Concept Lattices
Kuznetsov shows that Formal Concept Analysis (FCA) is a natural framework for learning from positive and negative examples. Indeed, the results of learning from positive examples (...
Peggy Cellier, Sébastien Ferré, Oliv...
GC
2004
Springer
14 years 1 months ago
Communities: Concept-Based Querying for Mobile Services
In this paper, we consider semantic service discovery in a global computing environment. We propose creating a dynamic overlay network by grouping together semantically related ser...
Chara Skouteli, Christoforos Panayiotou, George Sa...