Sciweavers

482 search results - page 44 / 97
» A taxonomy of computer worms
Sort
View
PERCOM
2011
ACM
13 years 14 days ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
UAI
2008
13 years 10 months ago
Bayesian Out-Trees
A Bayesian treatment of latent directed graph structure for non-iid data is provided where each child datum is sampled with a directed conditional dependence on a single unknown p...
Tony Jebara
AIEDAM
1999
157views more  AIEDAM 1999»
13 years 8 months ago
Representing a robotic domain using temporal description logics
A temporal logic for representing and reasoning on a robotic domain is presented. Actions are represented by describing what is true while the action itself is occurring, and plan...
Alessandro Artale, Enrico Franconi
DIGRA
2003
Springer
14 years 2 months ago
Describing Games: An Interaction-Centric Structural Framework
We present a structural framework to describe games in terms of components. The components are divided into four major areas: meta-structure, bounding, narrative and objective. Th...
Staffan Björk, Jussi Holopainen
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
14 years 20 days ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith