Sciweavers

562 search results - page 68 / 113
» Attack graph generation and analysis
Sort
View
USS
2004
13 years 9 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
NDSS
2008
IEEE
14 years 2 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
WWW
2009
ACM
14 years 8 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
CORR
2011
Springer
202views Education» more  CORR 2011»
13 years 2 months ago
High Degree Vertices, Eigenvalues and Diameter of Random Apollonian Networks
ABSTRACT. Upon the discovery of power laws [8, 16, 30], a large body of work in complex network analysis has focused on developing generative models of graphs which mimick real-wor...
Alan M. Frieze, Charalampos E. Tsourakakis
AAAI
2004
13 years 9 months ago
Comparing Cognitive and Computational Models of Narrative Structure
A growing number of applications seek to incorporate automatically generated narrative structure into interactive virtual environments. In this paper, we evaluate a representation...
David B. Christian, R. Michael Young