Sciweavers

335 search results - page 44 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 7 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
ICIP
2006
IEEE
14 years 9 months ago
An Approach for Intersubject Analysis of 3D Brain Images Based on Conformal Geometry
Recent advances in imaging technologies, such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) and Diffusion Tensor Imaging (DTI) have accelerated brain res...
Guangyu Zou, Jing Hua, Xianfeng Gu, Otto Muzik
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 24 days ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 3 days ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...