Sciweavers

587 search results - page 89 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
CCS
2009
ACM
14 years 3 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
CMS
2006
13 years 10 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
SPIRE
2010
Springer
13 years 7 months ago
Identifying SNPs without a Reference Genome by Comparing Raw Reads
Next generation sequencing (NGS) technologies are being applied to many fields of biology, notably to survey the polymorphism across individuals of a species. However, while single...
Pierre Peterlongo, Nicolas Schnel, Nadia Pisanti, ...
BMCBI
2010
193views more  BMCBI 2010»
13 years 9 months ago
Probe set filtering increases correlation between Affymetrix GeneChip and qRT-PCR expression measurements
Background: Affymetrix GeneChip microarrays are popular platforms for expression profiling in two types of studies: detection of differential expression computed by p-values of t-...
Jakub Mieczkowski, Magdalena E. Tyburczy, Michal D...
HUC
2004
Springer
14 years 2 months ago
MouseField: A Simple and Versatile Input Device for Ubiquitous Computing
Although various interaction technologies for handling information in the ubiquitous computing environment have been proposed, some techniques are too simple for performing rich in...
Toshiyuki Masui, Koji Tsukada, Itiro Siio